CVE-2024-44995

In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix a deadlock problem when config TC during resetting When config TC during the reset process, may cause a deadlock, the flow is as below: pf reset start │ ▼ ...... setup tc │ │ ▼ ▼ DOWN: napi_disable() napi_disable()(skip) │ │ │ ▼ ▼ ...... ...... │ │ ▼ │ napi_enable() │ ▼ UINIT: netif_napi_del() │ ▼ ...... │ ▼ INIT: netif_napi_add() │ ▼ ...... global reset start │ │ ▼ ▼ UP: napi_enable()(skip) ...... │ │ ▼ ▼ ...... napi_disable() In reset process, the driver will DOWN the port and then UINIT, in this case, the setup tc process will UP the port before UINIT, so cause the problem. Adds a DOWN process in UINIT to fix it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*

History

15 Sep 2024, 18:15

Type Values Removed Values Added
CWE CWE-667
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/195918217448a6bb7f929d6a2ffffce9f1ece1cc - () https://git.kernel.org/stable/c/195918217448a6bb7f929d6a2ffffce9f1ece1cc - Patch
References () https://git.kernel.org/stable/c/67492d4d105c0a6321b00c393eec96b9a7a97a16 - () https://git.kernel.org/stable/c/67492d4d105c0a6321b00c393eec96b9a7a97a16 - Patch
References () https://git.kernel.org/stable/c/6ae2b7d63cd056f363045eb65409143e16f23ae8 - () https://git.kernel.org/stable/c/6ae2b7d63cd056f363045eb65409143e16f23ae8 - Patch
References () https://git.kernel.org/stable/c/be5e816d00a506719e9dbb1a9c861c5ced30a109 - () https://git.kernel.org/stable/c/be5e816d00a506719e9dbb1a9c861c5ced30a109 - Patch
References () https://git.kernel.org/stable/c/de37408d5c26fc4a296a28a0c96dcb814219bfa1 - () https://git.kernel.org/stable/c/de37408d5c26fc4a296a28a0c96dcb814219bfa1 - Patch
References () https://git.kernel.org/stable/c/fa1d4de7265c370e673583ac8d1bd17d21826cd9 - () https://git.kernel.org/stable/c/fa1d4de7265c370e673583ac8d1bd17d21826cd9 - Patch
References () https://git.kernel.org/stable/c/fc250eca15bde34c4c8f806b9d88f55bd56a992c - () https://git.kernel.org/stable/c/fc250eca15bde34c4c8f806b9d88f55bd56a992c - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net:hns3: se corrige un problema de bloqueo cuando se configura TC durante el reinicio Cuando se configura TC durante el proceso de reinicio, puede causar un bloqueo, el flujo es el siguiente: pf reset start ? ? ...... setup tc ? ? ? ? DOWN: napi_disable() napi_disable()(skip) ? ? ? ? ? ...... ...... ? ? ? ? napi_enable() ? ? UINIT: netif_napi_del() ? ? ...... ? ? INIT: netif_napi_add() ? ? ...... global reset start ? ? ? ? UP: napi_enable()(skip) ...... ? ? ? ? ...... napi_disable() En el proceso de reinicio, el controlador DESACTIVARÁ el puerto y luego UINIT; en este caso, el proceso de configuración tc DESACTIVARÁ el puerto antes de UINIT, lo que provocará el problema. Agrega un proceso DESACTIVADO en UINIT para solucionarlo.
CPE cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

04 Sep 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-04 20:15

Updated : 2024-09-15 18:15


NVD link : CVE-2024-44995

Mitre link : CVE-2024-44995

CVE.ORG link : CVE-2024-44995


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking