CVE-2024-38607

In the Linux kernel, the following vulnerability has been resolved: macintosh/via-macii: Fix "BUG: sleeping function called from invalid context" The via-macii ADB driver calls request_irq() after disabling hard interrupts. But disabling interrupts isn't necessary here because the VIA shift register interrupt was masked during VIA1 initialization.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*

History

03 Oct 2025, 15:24

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/010d4cb19bb13f423e3e746b824f314a9bf3e9a9 - () https://git.kernel.org/stable/c/010d4cb19bb13f423e3e746b824f314a9bf3e9a9 - Patch
References () https://git.kernel.org/stable/c/1e9c3f2caec548cfa7a65416ec4e6006e542f18e - () https://git.kernel.org/stable/c/1e9c3f2caec548cfa7a65416ec4e6006e542f18e - Patch
References () https://git.kernel.org/stable/c/280619bbdeac186fb320fab3d61122d2a085def8 - () https://git.kernel.org/stable/c/280619bbdeac186fb320fab3d61122d2a085def8 - Patch
References () https://git.kernel.org/stable/c/2907d409ce5946390f513976f0454888d37d1058 - () https://git.kernel.org/stable/c/2907d409ce5946390f513976f0454888d37d1058 - Patch
References () https://git.kernel.org/stable/c/5900a88e897e6deb1bdce09ee34167a81c2da89d - () https://git.kernel.org/stable/c/5900a88e897e6deb1bdce09ee34167a81c2da89d - Patch
References () https://git.kernel.org/stable/c/787fb79efc15b3b86442ecf079b8148f173376d7 - () https://git.kernel.org/stable/c/787fb79efc15b3b86442ecf079b8148f173376d7 - Patch
References () https://git.kernel.org/stable/c/d301a71c76ee4c384b4e03cdc320a55f5cf1df05 - () https://git.kernel.org/stable/c/d301a71c76ee4c384b4e03cdc320a55f5cf1df05 - Patch
References () https://git.kernel.org/stable/c/d43a8c7ec0841e0ff91a968770aeca83f0fd4c56 - () https://git.kernel.org/stable/c/d43a8c7ec0841e0ff91a968770aeca83f0fd4c56 - Patch
References () https://git.kernel.org/stable/c/e4ff8bcfb2841fe4e17e5901578b632adb89036d - () https://git.kernel.org/stable/c/e4ff8bcfb2841fe4e17e5901578b632adb89036d - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/010d4cb19bb13f423e3e746b824f314a9bf3e9a9 - () https://git.kernel.org/stable/c/010d4cb19bb13f423e3e746b824f314a9bf3e9a9 -
References () https://git.kernel.org/stable/c/1e9c3f2caec548cfa7a65416ec4e6006e542f18e - () https://git.kernel.org/stable/c/1e9c3f2caec548cfa7a65416ec4e6006e542f18e -
References () https://git.kernel.org/stable/c/280619bbdeac186fb320fab3d61122d2a085def8 - () https://git.kernel.org/stable/c/280619bbdeac186fb320fab3d61122d2a085def8 -
References () https://git.kernel.org/stable/c/2907d409ce5946390f513976f0454888d37d1058 - () https://git.kernel.org/stable/c/2907d409ce5946390f513976f0454888d37d1058 -
References () https://git.kernel.org/stable/c/5900a88e897e6deb1bdce09ee34167a81c2da89d - () https://git.kernel.org/stable/c/5900a88e897e6deb1bdce09ee34167a81c2da89d -
References () https://git.kernel.org/stable/c/787fb79efc15b3b86442ecf079b8148f173376d7 - () https://git.kernel.org/stable/c/787fb79efc15b3b86442ecf079b8148f173376d7 -
References () https://git.kernel.org/stable/c/d301a71c76ee4c384b4e03cdc320a55f5cf1df05 - () https://git.kernel.org/stable/c/d301a71c76ee4c384b4e03cdc320a55f5cf1df05 -
References () https://git.kernel.org/stable/c/d43a8c7ec0841e0ff91a968770aeca83f0fd4c56 - () https://git.kernel.org/stable/c/d43a8c7ec0841e0ff91a968770aeca83f0fd4c56 -
References () https://git.kernel.org/stable/c/e4ff8bcfb2841fe4e17e5901578b632adb89036d - () https://git.kernel.org/stable/c/e4ff8bcfb2841fe4e17e5901578b632adb89036d -

20 Jun 2024, 12:43

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: macintosh/via-macii: Corrección "ERROR: función de suspensión llamada desde un contexto no válido" El controlador ADB via-macii llama a request_irq() después de deshabilitar las interrupciones bruscas. Pero aquí no es necesario deshabilitar las interrupciones porque la interrupción del registro de desplazamiento de VIA se enmascaró durante la inicialización de VIA1.

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2025-10-03 15:24


NVD link : CVE-2024-38607

Mitre link : CVE-2024-38607

CVE.ORG link : CVE-2024-38607


JSON object : View

Products Affected

linux

  • linux_kernel