CVE-2024-42268
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mlx5: Fix missing lock on sync reset reload<br />
<br />
On sync reset reload work, when remote host updates devlink on reload<br />
actions performed on that host, it misses taking devlink lock before<br />
calling devlink_remote_reload_actions_performed() which results in<br />
triggering lock assert like the following:<br />
<br />
WARNING: CPU: 4 PID: 1164 at net/devlink/core.c:261 devl_assert_locked+0x3e/0x50<br />
…<br />
CPU: 4 PID: 1164 Comm: kworker/u96:6 Tainted: G S W 6.10.0-rc2+ #116<br />
Hardware name: Supermicro SYS-2028TP-DECTR/X10DRT-PT, BIOS 2.0 12/18/2015<br />
Workqueue: mlx5_fw_reset_events mlx5_sync_reset_reload_work [mlx5_core]<br />
RIP: 0010:devl_assert_locked+0x3e/0x50<br />
…<br />
Call Trace:<br />
<br />
? __warn+0xa4/0x210<br />
? devl_assert_locked+0x3e/0x50<br />
? report_bug+0x160/0x280<br />
? handle_bug+0x3f/0x80<br />
? exc_invalid_op+0x17/0x40<br />
? asm_exc_invalid_op+0x1a/0x20<br />
? devl_assert_locked+0x3e/0x50<br />
devlink_notify+0x88/0x2b0<br />
? mlx5_attach_device+0x20c/0x230 [mlx5_core]<br />
? __pfx_devlink_notify+0x10/0x10<br />
? process_one_work+0x4b6/0xbb0<br />
process_one_work+0x4b6/0xbb0<br />
[…]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.1.104 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.45 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/091268f3c27a5b6d7858a3bb2a0dbcc9cd26ddb5
- https://git.kernel.org/stable/c/572f9caa9e7295f8c8822e4122c7ae8f1c412ff9
- https://git.kernel.org/stable/c/5d07d1d40aabfd61bab21115639bd4f641db6002
- https://git.kernel.org/stable/c/98884e89c90d077f6fe6ba18e6cf6f914642f04e
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



