CVE-2024-53093

In the Linux kernel, the following vulnerability has been resolved: nvme-multipath: defer partition scanning We need to suppress the partition scan from occuring within the controller's scan_work context. If a path error occurs here, the IO will wait until a path becomes available or all paths are torn down, but that action also occurs within scan_work, so it would deadlock. Defer the partion scan to a different context that does not block scan_work.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*

History

24 Dec 2024, 15:02

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-multipath: aplazar el escaneo de particiones Necesitamos evitar que el escaneo de particiones se realice dentro del contexto scan_work del controlador. Si se produce un error de ruta aquí, la IO esperará hasta que haya una ruta disponible o se eliminen todas las rutas, pero esa acción también ocurre dentro de scan_work, por lo que se bloquearía. Aplaza el escaneo de particiones a un contexto diferente que no bloquee scan_work.
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/1f021341eef41e77a633186e9be5223de2ce5d48 - () https://git.kernel.org/stable/c/1f021341eef41e77a633186e9be5223de2ce5d48 - Patch
References () https://git.kernel.org/stable/c/4a57f42e5ed42cb8f1beb262c4f6d3e698939e4e - () https://git.kernel.org/stable/c/4a57f42e5ed42cb8f1beb262c4f6d3e698939e4e - Patch
References () https://git.kernel.org/stable/c/60de2e03f984cfbcdc12fa552f95087c35a05a98 - () https://git.kernel.org/stable/c/60de2e03f984cfbcdc12fa552f95087c35a05a98 - Patch
References () https://git.kernel.org/stable/c/a91b7eddf45afeeb9c5ece11dddff5de0921b00f - () https://git.kernel.org/stable/c/a91b7eddf45afeeb9c5ece11dddff5de0921b00f - Patch

21 Nov 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-21 19:15

Updated : 2024-12-24 15:02


NVD link : CVE-2024-53093

Mitre link : CVE-2024-53093

CVE.ORG link : CVE-2024-53093


JSON object : View

Products Affected

linux

  • linux_kernel