CVE-2024-38597

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/06/2024
Last modified:
27/08/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> eth: sungem: remove .ndo_poll_controller to avoid deadlocks<br /> <br /> Erhard reports netpoll warnings from sungem:<br /> <br /> netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398)<br /> WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c<br /> <br /> gem_poll_controller() disables interrupts, which may sleep.<br /> We can&amp;#39;t sleep in netpoll, it has interrupts disabled completely.<br /> Strangely, gem_poll_controller() doesn&amp;#39;t even poll the completions,<br /> and instead acts as if an interrupt has fired so it just schedules<br /> NAPI and exits. None of this has been necessary for years, since<br /> netpoll invokes NAPI directly.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.1 (including) 5.10.219 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.161 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.93 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.33 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.9.3 (excluding)