CVE-2024-40966

In the Linux kernel, the following vulnerability has been resolved: tty: add the option to have a tty reject a new ldisc ... and use it to limit the virtual terminals to just N_TTY. They are kind of special, and in particular, the "con_write()" routine violates the "writes cannot sleep" rule that some ldiscs rely on. This avoids the BUG: sleeping function called from invalid context at kernel/printk/printk.c:2659 when N_GSM has been attached to a virtual console, and gsmld_write() calls con_write() while holding a spinlock, and con_write() then tries to get the console lock.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Oct 2025, 20:45

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/287b569a5b914903ba7c438a3c0dbc3410ebb409 - () https://git.kernel.org/stable/c/287b569a5b914903ba7c438a3c0dbc3410ebb409 - Patch
References () https://git.kernel.org/stable/c/3c6332f3bb1578b5b10ac2561247b1d6272ae937 - () https://git.kernel.org/stable/c/3c6332f3bb1578b5b10ac2561247b1d6272ae937 - Patch
References () https://git.kernel.org/stable/c/5920ac19964f9e20181f63b410d9200ddbf8dc86 - () https://git.kernel.org/stable/c/5920ac19964f9e20181f63b410d9200ddbf8dc86 - Patch
References () https://git.kernel.org/stable/c/6bd23e0c2bb6c65d4f5754d1456bc9a4427fc59b - () https://git.kernel.org/stable/c/6bd23e0c2bb6c65d4f5754d1456bc9a4427fc59b - Patch
First Time Linux linux Kernel
Linux

21 Nov 2024, 09:31

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/287b569a5b914903ba7c438a3c0dbc3410ebb409 - () https://git.kernel.org/stable/c/287b569a5b914903ba7c438a3c0dbc3410ebb409 -
References () https://git.kernel.org/stable/c/3c6332f3bb1578b5b10ac2561247b1d6272ae937 - () https://git.kernel.org/stable/c/3c6332f3bb1578b5b10ac2561247b1d6272ae937 -
References () https://git.kernel.org/stable/c/5920ac19964f9e20181f63b410d9200ddbf8dc86 - () https://git.kernel.org/stable/c/5920ac19964f9e20181f63b410d9200ddbf8dc86 -
References () https://git.kernel.org/stable/c/6bd23e0c2bb6c65d4f5754d1456bc9a4427fc59b - () https://git.kernel.org/stable/c/6bd23e0c2bb6c65d4f5754d1456bc9a4427fc59b -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: agregue la opción para que un tty rechace un nuevo ldisc... y utilícelo para limitar las terminales virtuales a solo N_TTY. Son algo especiales y, en particular, la rutina "con_write()" viola la regla "las escrituras no pueden dormir" en la que se basan algunos ldiscs. Esto evita el ERROR: función de suspensión llamada desde un contexto no válido en kernel/printk/printk.c:2659 cuando N_GSM se ha conectado a una consola virtual, y gsmld_write() llama a con_write() mientras mantiene un spinlock, y con_write() luego intenta para obtener el bloqueo de la consola.

12 Jul 2024, 16:34

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-10-06 20:45


NVD link : CVE-2024-40966

Mitre link : CVE-2024-40966

CVE.ORG link : CVE-2024-40966


JSON object : View

Products Affected

linux

  • linux_kernel