CVE-2024-27005
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
01/05/2024
Last modified:
23/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
interconnect: Don&#39;t access req_list while it&#39;s being manipulated<br />
<br />
The icc_lock mutex was split into separate icc_lock and icc_bw_lock<br />
mutexes in [1] to avoid lockdep splats. However, this didn&#39;t adequately<br />
protect access to icc_node::req_list.<br />
<br />
The icc_set_bw() function will eventually iterate over req_list while<br />
only holding icc_bw_lock, but req_list can be modified while only<br />
holding icc_lock. This causes races between icc_set_bw(), of_icc_get(),<br />
and icc_put().<br />
<br />
Example A:<br />
<br />
CPU0 CPU1<br />
---- ----<br />
icc_set_bw(path_a)<br />
mutex_lock(&icc_bw_lock);<br />
icc_put(path_b)<br />
mutex_lock(&icc_lock);<br />
aggregate_requests()<br />
hlist_for_each_entry(r, ...<br />
hlist_del(...<br />
<br />
<br />
Example B:<br />
<br />
CPU0 CPU1<br />
---- ----<br />
icc_set_bw(path_a)<br />
mutex_lock(&icc_bw_lock);<br />
path_b = of_icc_get()<br />
of_icc_get_by_index()<br />
mutex_lock(&icc_lock);<br />
path_find()<br />
path_init()<br />
aggregate_requests()<br />
hlist_for_each_entry(r, ...<br />
hlist_add_head(...<br />
<br />
<br />
Fix this by ensuring icc_bw_lock is always held before manipulating<br />
icc_node::req_list. The additional places icc_bw_lock is held don&#39;t<br />
perform any memory allocations, so we should still be safe from the<br />
original lockdep splats that motivated the separate locks.<br />
<br />
[1] commit af42269c3523 ("interconnect: Fix locking for runpm vs reclaim")
Impact
Base Score 3.x
6.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.133 (including) | 5.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.55 (including) | 6.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.5.5 (including) | 6.6.29 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/19ec82b3cad1abef2a929262b8c1528f4e0c192d
- https://git.kernel.org/stable/c/4c65507121ea8e0b47fae6d2049c8688390d46b6
- https://git.kernel.org/stable/c/d0d04efa2e367921654b5106cc5c05e3757c2b42
- https://git.kernel.org/stable/c/de1bf25b6d771abdb52d43546cf57ad775fb68a1
- https://git.kernel.org/stable/c/fe549d8e976300d0dd75bd904eb216bed8b145e0
- https://git.kernel.org/stable/c/4c65507121ea8e0b47fae6d2049c8688390d46b6
- https://git.kernel.org/stable/c/d0d04efa2e367921654b5106cc5c05e3757c2b42
- https://git.kernel.org/stable/c/de1bf25b6d771abdb52d43546cf57ad775fb68a1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/



