CVE-2024-56701
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore<br />
<br />
The dtl_access_lock needs to be a rw_sempahore, a sleeping lock, because<br />
the code calls kmalloc() while holding it, which can sleep:<br />
<br />
# echo 1 > /proc/powerpc/vcpudispatch_stats<br />
BUG: sleeping function called from invalid context at include/linux/sched/mm.h:337<br />
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 199, name: sh<br />
preempt_count: 1, expected: 0<br />
3 locks held by sh/199:<br />
#0: c00000000a0743f8 (sb_writers#3){.+.+}-{0:0}, at: vfs_write+0x324/0x438<br />
#1: c0000000028c7058 (dtl_enable_mutex){+.+.}-{3:3}, at: vcpudispatch_stats_write+0xd4/0x5f4<br />
#2: c0000000028c70b8 (dtl_access_lock){+.+.}-{2:2}, at: vcpudispatch_stats_write+0x220/0x5f4<br />
CPU: 0 PID: 199 Comm: sh Not tainted 6.10.0-rc4 #152<br />
Hardware name: IBM pSeries (emulated by qemu) POWER9 (raw) 0x4e1202 0xf000005 of:SLOF,HEAD hv:linux,kvm pSeries<br />
Call Trace:<br />
dump_stack_lvl+0x130/0x148 (unreliable)<br />
__might_resched+0x174/0x410<br />
kmem_cache_alloc_noprof+0x340/0x3d0<br />
alloc_dtl_buffers+0x124/0x1ac<br />
vcpudispatch_stats_write+0x2a8/0x5f4<br />
proc_reg_write+0xf4/0x150<br />
vfs_write+0xfc/0x438<br />
ksys_write+0x88/0x148<br />
system_call_exception+0x1c4/0x5a0<br />
system_call_common+0xf4/0x258
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.3 (including) | 5.10.231 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.174 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/525e18f1ba7c2b098c8ba587fb397efb34a6574c
- https://git.kernel.org/stable/c/6956c0e7346ce1bbfc726755aa8da10d26e84276
- https://git.kernel.org/stable/c/a246daa26b717e755ccc9061f47f7cd1c0b358dd
- https://git.kernel.org/stable/c/b125d0cf1adde7b2b47d7337fed7e9133eea3463
- https://git.kernel.org/stable/c/cadae3a45d23aa4f6485938a67cbc47aaaa25e38
- https://git.kernel.org/stable/c/f6ec133668757f84e5143f1eb141fd0b83778b9e
- https://git.kernel.org/stable/c/fa5b5ea257135e771b489c83a2e93b5935d0108e
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



