CVE-2024-26788
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/04/2024
Last modified:
01/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
dmaengine: fsl-qdma: init irq after reg initialization<br />
<br />
Initialize the qDMA irqs after the registers are configured so that<br />
interrupts that may have been pending from a primary kernel don&#39;t get<br />
processed by the irq handler before it is ready to and cause panic with<br />
the following trace:<br />
<br />
Call trace:<br />
fsl_qdma_queue_handler+0xf8/0x3e8<br />
__handle_irq_event_percpu+0x78/0x2b0<br />
handle_irq_event_percpu+0x1c/0x68<br />
handle_irq_event+0x44/0x78<br />
handle_fasteoi_irq+0xc8/0x178<br />
generic_handle_irq+0x24/0x38<br />
__handle_domain_irq+0x90/0x100<br />
gic_handle_irq+0x5c/0xb8<br />
el1_irq+0xb8/0x180<br />
_raw_spin_unlock_irqrestore+0x14/0x40<br />
__setup_irq+0x4bc/0x798<br />
request_threaded_irq+0xd8/0x190<br />
devm_request_threaded_irq+0x74/0xe8<br />
fsl_qdma_probe+0x4d4/0xca8<br />
platform_drv_probe+0x50/0xa0<br />
really_probe+0xe0/0x3f8<br />
driver_probe_device+0x64/0x130<br />
device_driver_attach+0x6c/0x78<br />
__driver_attach+0xbc/0x158<br />
bus_for_each_dev+0x5c/0x98<br />
driver_attach+0x20/0x28<br />
bus_add_driver+0x158/0x220<br />
driver_register+0x60/0x110<br />
__platform_driver_register+0x44/0x50<br />
fsl_qdma_driver_init+0x18/0x20<br />
do_one_initcall+0x48/0x258<br />
kernel_init_freeable+0x1a4/0x23c<br />
kernel_init+0x10/0xf8<br />
ret_from_fork+0x10/0x18
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.1 (including) | 5.4.271 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.212 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.151 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3cc5fb824c2125aa3740d905b3e5b378c8a09478
- https://git.kernel.org/stable/c/4529c084a320be78ff2c5e64297ae998c6fdf66b
- https://git.kernel.org/stable/c/474d521da890b3e3585335fb80a6044cb2553d99
- https://git.kernel.org/stable/c/677102a930643c31f1b4c512b041407058bdfef8
- https://git.kernel.org/stable/c/87a39071e0b639f45e05d296cc0538eef44ec0bd
- https://git.kernel.org/stable/c/9579a21e99fe8dab22a253050ddff28d340d74e1
- https://git.kernel.org/stable/c/a69c8bbb946936ac4eb6a6ae1e849435aa8d947d
- https://git.kernel.org/stable/c/3cc5fb824c2125aa3740d905b3e5b378c8a09478
- https://git.kernel.org/stable/c/4529c084a320be78ff2c5e64297ae998c6fdf66b
- https://git.kernel.org/stable/c/474d521da890b3e3585335fb80a6044cb2553d99
- https://git.kernel.org/stable/c/677102a930643c31f1b4c512b041407058bdfef8
- https://git.kernel.org/stable/c/87a39071e0b639f45e05d296cc0538eef44ec0bd
- https://git.kernel.org/stable/c/9579a21e99fe8dab22a253050ddff28d340d74e1
- https://git.kernel.org/stable/c/a69c8bbb946936ac4eb6a6ae1e849435aa8d947d
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html



