Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2024-42268— net/mlx5: Fix missing lock on sync reset reload

EPSS 0.01% · P2

Affected Version Matrix 10

VendorProductVersion RangeStatus
LinuxLinux84a433a40d0ebf3bbf36b8bfa58c6f45dc782344< 5d07d1d40aabfd61bab21115639bd4f641db6002affected
84a433a40d0ebf3bbf36b8bfa58c6f45dc782344< 98884e89c90d077f6fe6ba18e6cf6f914642f04eaffected
84a433a40d0ebf3bbf36b8bfa58c6f45dc782344< 091268f3c27a5b6d7858a3bb2a0dbcc9cd26ddb5affected
84a433a40d0ebf3bbf36b8bfa58c6f45dc782344< 572f9caa9e7295f8c8822e4122c7ae8f1c412ff9affected
6.0affected
< 6.0unaffected
6.1.104≤ 6.1.*unaffected
6.6.45≤ 6.6.*unaffected
… +2 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-42268

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
net/mlx5: Fix missing lock on sync reset reload
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix missing lock on sync reset reload On sync reset reload work, when remote host updates devlink on reload actions performed on that host, it misses taking devlink lock before calling devlink_remote_reload_actions_performed() which results in triggering lock assert like the following: WARNING: CPU: 4 PID: 1164 at net/devlink/core.c:261 devl_assert_locked+0x3e/0x50 … CPU: 4 PID: 1164 Comm: kworker/u96:6 Tainted: G S W 6.10.0-rc2+ #116 Hardware name: Supermicro SYS-2028TP-DECTR/X10DRT-PT, BIOS 2.0 12/18/2015 Workqueue: mlx5_fw_reset_events mlx5_sync_reset_reload_work [mlx5_core] RIP: 0010:devl_assert_locked+0x3e/0x50 … Call Trace: <TASK> ? __warn+0xa4/0x210 ? devl_assert_locked+0x3e/0x50 ? report_bug+0x160/0x280 ? handle_bug+0x3f/0x80 ? exc_invalid_op+0x17/0x40 ? asm_exc_invalid_op+0x1a/0x20 ? devl_assert_locked+0x3e/0x50 devlink_notify+0x88/0x2b0 ? mlx5_attach_device+0x20c/0x230 [mlx5_core] ? __pfx_devlink_notify+0x10/0x10 ? process_one_work+0x4b6/0xbb0 process_one_work+0x4b6/0xbb0 […]
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于net/mlx5组件在同步重置时缺少锁,导致在调用devlink_remote_reload_actions_performed函数之前未进行devlink锁的获取。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 84a433a40d0ebf3bbf36b8bfa58c6f45dc782344 ~ 5d07d1d40aabfd61bab21115639bd4f641db6002 -
LinuxLinux 6.0 -

II. Public POCs for CVE-2024-42268

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-42268

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-08-17 · 109 CVEs total

CVE-2024-43820dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume
CVE-2024-43833media: v4l: async: Fix NULL pointer dereference in adding ancillary links
CVE-2024-43831media: mediatek: vcodec: Handle invalid decoder vsi
CVE-2024-43832s390/uv: Don't call folio_wait_writeback() without a folio reference
CVE-2024-43830leds: trigger: Unregister sysfs attributes before calling deactivate()
CVE-2024-43829drm/qxl: Add check for drm_cvt_mode
CVE-2024-43828ext4: fix infinite loop when replaying fast_commit
CVE-2024-43827drm/amd/display: Add null check before access structs
CVE-2024-43826nfs: pass explicit offset/count to trace events
CVE-2024-43825iio: Fix the sorting functionality in iio_gts_build_avail_time_table
CVE-2024-43823PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_re
CVE-2024-43824PCI: endpoint: pci-epf-test: Make use of cached 'epc_features' in pci_epf_test_core_init()
CVE-2024-43822ASoc: PCM6240: Return directly after a failed devm_kzalloc() in pcmdevice_i2c_probe()
CVE-2024-43821scsi: lpfc: Fix a possible null pointer dereference
CVE-2024-42318landlock: Don't lose track of restrictions on cred_transfer
CVE-2024-42321net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE
CVE-2024-42320s390/dasd: fix error checks in dasd_copy_pair_store()
CVE-2024-42319mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable()
CVE-2024-42322ipvs: properly dereference pe in ip_vs_add_service
CVE-2024-42317mm/huge_memory: avoid PMD-size page cache if needed

Showing top 20 of 109 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-42268

No comments yet


Leave a comment