CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix missing lock on sync reset reload
On sync reset reload work, when remote host updates devlink on reload
actions performed on that host, it misses taking devlink lock before
calling devlink_remote_reload_actions_performed() which results in
triggering lock assert like the following:
WARNING: CPU: 4 PID: 1164 at net/devlink/core.c:261
devl_assert_locked+0x3e/0x50
ā¦
CPU: 4 PID: 1164 Comm: kworker/u96:6 Tainted: G S W
6.10.0-rc2+ #116
Hardware name: Supermicro SYS-2028TP-DECTR/X10DRT-PT, BIOS 2.0 12/18/2015
Workqueue: mlx5_fw_reset_events mlx5_sync_reset_reload_work [mlx5_core]
RIP: 0010:devl_assert_locked+0x3e/0x50
ā¦
Call Trace:
<TASK>
? __warn+0xa4/0x210
? devl_assert_locked+0x3e/0x50
? report_bug+0x160/0x280
? handle_bug+0x3f/0x80
? exc_invalid_op+0x17/0x40
? asm_exc_invalid_op+0x1a/0x20
? devl_assert_locked+0x3e/0x50
devlink_notify+0x88/0x2b0
? mlx5_attach_device+0x20c/0x230 [mlx5_core]
? __pfx_devlink_notify+0x10/0x10
? process_one_work+0x4b6/0xbb0
process_one_work+0x4b6/0xbb0
[ā¦]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 24.04 | noarch | linux | <Ā any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | <Ā any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-azure | <Ā any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-gcp | <Ā any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-gke | <Ā any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-hwe-6.8 | <Ā any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-ibm | <Ā any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-intel | <Ā any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-lowlatency | <Ā any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-lowlatency-hwe-6.8 | <Ā any | UNKNOWN |
git.kernel.org/linus/572f9caa9e7295f8c8822e4122c7ae8f1c412ff9 (6.11-rc2)
git.kernel.org/stable/c/091268f3c27a5b6d7858a3bb2a0dbcc9cd26ddb5
git.kernel.org/stable/c/572f9caa9e7295f8c8822e4122c7ae8f1c412ff9
git.kernel.org/stable/c/5d07d1d40aabfd61bab21115639bd4f641db6002
git.kernel.org/stable/c/98884e89c90d077f6fe6ba18e6cf6f914642f04e
launchpad.net/bugs/cve/CVE-2024-42268
nvd.nist.gov/vuln/detail/CVE-2024-42268
security-tracker.debian.org/tracker/CVE-2024-42268
www.cve.org/CVERecord?id=CVE-2024-42268