CVE-2024-47735
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
12/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled<br />
<br />
Fix missuse of spin_lock_irq()/spin_unlock_irq() when<br />
spin_lock_irqsave()/spin_lock_irqrestore() was hold.<br />
<br />
This was discovered through the lock debugging, and the corresponding<br />
log is as follows:<br />
<br />
raw_local_irq_restore() called with IRQs enabled<br />
WARNING: CPU: 96 PID: 2074 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x30/0x40<br />
...<br />
Call trace:<br />
warn_bogus_irq_restore+0x30/0x40<br />
_raw_spin_unlock_irqrestore+0x84/0xc8<br />
add_qp_to_list+0x11c/0x148 [hns_roce_hw_v2]<br />
hns_roce_create_qp_common.constprop.0+0x240/0x780 [hns_roce_hw_v2]<br />
hns_roce_create_qp+0x98/0x160 [hns_roce_hw_v2]<br />
create_qp+0x138/0x258<br />
ib_create_qp_kernel+0x50/0xe8<br />
create_mad_qp+0xa8/0x128<br />
ib_mad_port_open+0x218/0x448<br />
ib_mad_init_device+0x70/0x1f8<br />
add_client_context+0xfc/0x220<br />
enable_device_and_get+0xd0/0x140<br />
ib_register_device.part.0+0xf4/0x1c8<br />
ib_register_device+0x34/0x50<br />
hns_roce_register_device+0x174/0x3d0 [hns_roce_hw_v2]<br />
hns_roce_init+0xfc/0x2c0 [hns_roce_hw_v2]<br />
__hns_roce_hw_v2_init_instance+0x7c/0x1d0 [hns_roce_hw_v2]<br />
hns_roce_hw_v2_init_instance+0x9c/0x180 [hns_roce_hw_v2]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9 (including) | 5.10.227 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.54 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/07f0f643d7e570dbe8ef6f5c3367a43e3086a335
- https://git.kernel.org/stable/c/094a1821903f33fb91de4b71087773ee16aeb3a0
- https://git.kernel.org/stable/c/2656336a84fcb6802f6e6c233f4661891deea24f
- https://git.kernel.org/stable/c/29c0f546d3fd66238b42cf25bcd5f193bb1cf794
- https://git.kernel.org/stable/c/425589d4af09c49574bd71ac31f811362a5126c3
- https://git.kernel.org/stable/c/74d315b5af180220d561684d15897730135733a6
- https://git.kernel.org/stable/c/a1a3403bb1826c8ec787f0d60c3e7b54f419129e
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
- https://cert-portal.siemens.com/productcert/html/ssa-265688.html
- https://cert-portal.siemens.com/productcert/html/ssa-355557.html



