CVE-2024-35808
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/05/2024
Last modified:
19/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
md/dm-raid: don&#39;t call md_reap_sync_thread() directly<br />
<br />
Currently md_reap_sync_thread() is called from raid_message() directly<br />
without holding &#39;reconfig_mutex&#39;, this is definitely unsafe because<br />
md_reap_sync_thread() can change many fields that is protected by<br />
&#39;reconfig_mutex&#39;.<br />
<br />
However, hold &#39;reconfig_mutex&#39; here is still problematic because this<br />
will cause deadlock, for example, commit 130443d60b1b ("md: refactor<br />
idle/frozen_sync_thread() to fix deadlock").<br />
<br />
Fix this problem by using stop_sync_thread() to unregister sync_thread,<br />
like md/raid did.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.10 (including) | 6.7.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.8.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/347dcdc15a1706f61aa545ae498ededdf31aeebc
- https://git.kernel.org/stable/c/9e59b8d76ff511505eb0dd1478329f09e0f04669
- https://git.kernel.org/stable/c/cd32b27a66db8776d8b8e82ec7d7dde97a8693b0
- https://git.kernel.org/stable/c/347dcdc15a1706f61aa545ae498ededdf31aeebc
- https://git.kernel.org/stable/c/9e59b8d76ff511505eb0dd1478329f09e0f04669
- https://git.kernel.org/stable/c/cd32b27a66db8776d8b8e82ec7d7dde97a8693b0



