CVE-2024-43851
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
soc: xilinx: rename cpu_number1 to dummy_cpu_number<br />
<br />
The per cpu variable cpu_number1 is passed to xlnx_event_handler as<br />
argument "dev_id", but it is not used in this function. So drop the<br />
initialization of this variable and rename it to dummy_cpu_number.<br />
This patch is to fix the following call trace when the kernel option<br />
CONFIG_DEBUG_ATOMIC_SLEEP is enabled:<br />
<br />
BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274<br />
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0<br />
preempt_count: 1, expected: 0<br />
CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.1.0 #53<br />
Hardware name: Xilinx Versal vmk180 Eval board rev1.1 (QSPI) (DT)<br />
Call trace:<br />
dump_backtrace+0xd0/0xe0<br />
show_stack+0x18/0x40<br />
dump_stack_lvl+0x7c/0xa0<br />
dump_stack+0x18/0x34<br />
__might_resched+0x10c/0x140<br />
__might_sleep+0x4c/0xa0<br />
__kmem_cache_alloc_node+0xf4/0x168<br />
kmalloc_trace+0x28/0x38<br />
__request_percpu_irq+0x74/0x138<br />
xlnx_event_manager_probe+0xf8/0x298<br />
platform_probe+0x68/0xd8
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.77 (including) | 6.1.103 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.16 (including) | 6.6.44 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7.4 (including) | 6.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.10.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/4a95449dd975e2ea6629a034f3e74b46c9634916
- https://git.kernel.org/stable/c/a5e507fadab76393cbc12344ebd65a417a09aa46
- https://git.kernel.org/stable/c/a96e60a6ea6818fd37b1853283a512c49af38cf5
- https://git.kernel.org/stable/c/f762acdaff9e54688be16e6c832c73a61533c1df
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



