Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-27014 | First vendor Publication | 2024-05-01 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 5.5 | ||
Base Score | 5.5 | Environmental Score | 5.5 |
impact SubScore | 3.6 | Temporal Score | 5.5 |
Exploitabality Sub Score | 1.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | Low | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Prevent deadlock while disabling aRFS When disabling aRFS under the `priv->state_lock`, any scheduled aRFS works are canceled using the `cancel_work_sync` function, which waits for the work to end if it has already started. However, while waiting for the work handler, the handler will try to acquire the `state_lock` which is already acquired. The worker acquires the lock to delete the rules if the state is down, which is not the worker's responsibility since disabling aRFS deletes the rules. Add an aRFS state variable, which indicates whether the aRFS is enabled and prevent adding rules when the aRFS is disabled. Kernel log: ====================================================== WARNING: possible circular locking dependency detected 6.7.0-rc4_net_next_mlx5_5483eb2 #1 Tainted: G I ------------------------------------------------------ ethtool/386089 is trying to acquire lock: ffff88810f21ce68 ((work_completion)(&rule->arfs_work)){+.+.}-{0:0}, at: __flush_work+0x74/0x4e0 but task is already holding lock: ffff8884a1808cc0 (&priv->state_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core] which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&priv->state_lock){+.+.}-{3:3}: -> #0 ((work_completion)(&rule->arfs_work)){+.+.}-{0:0}: other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 *** DEADLOCK *** 3 locks held by ethtool/386089: stack backtrace: CPU: 15 PID: 386089 Comm: ethtool Tainted: G I 6.7.0-rc4_net_next_mlx5_5483eb2 #1 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 Call Trace: |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27014 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-667 | Insufficient Locking |
CPE : Common Platform Enumeration
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-06-26 02:30:07 |
|
2025-06-25 12:30:17 |
|
2025-06-24 02:34:36 |
|
2025-05-27 02:36:57 |
|
2025-03-29 03:35:45 |
|
2025-03-28 13:41:48 |
|
2025-03-28 03:14:48 |
|
2025-03-19 03:10:19 |
|
2025-03-18 03:23:00 |
|
2025-03-14 03:10:34 |
|
2025-03-06 14:06:49 |
|
2025-02-22 03:20:25 |
|
2025-01-08 03:02:16 |
|
2025-01-07 03:01:50 |
|
2024-12-25 03:00:33 |
|
2024-12-12 03:03:33 |
|
2024-11-25 09:25:53 |
|
2024-11-22 21:24:17 |
|
2024-11-21 21:24:03 |
|
2024-11-20 02:57:17 |
|
2024-11-14 02:57:36 |
|
2024-11-09 02:57:37 |
|
2024-10-26 02:55:02 |
|
2024-10-25 02:56:57 |
|
2024-10-23 02:56:10 |
|
2024-10-03 02:51:32 |
|
2024-10-02 02:49:57 |
|
2024-09-15 02:47:50 |
|
2024-09-12 02:47:23 |
|
2024-09-06 02:45:39 |
|
2024-09-04 02:48:54 |
|
2024-08-22 02:46:59 |
|
2024-08-02 13:56:04 |
|
2024-08-02 01:35:25 |
|
2024-05-24 00:28:11 |
|
2024-05-13 13:27:29 |
|
2024-05-03 09:27:31 |
|
2024-05-02 02:47:12 |
|
2024-05-02 02:47:06 |
|
2024-05-01 17:27:27 |
|
2024-05-01 13:27:28 |
|