CVE-2024-27000 — Improper Resource Locking in Linux
Severity
7.8HIGHNVD
EPSS
0.0%
top 97.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 1
Latest updateSep 18
Description
In the Linux kernel, the following vulnerability has been resolved:
serial: mxs-auart: add spinlock around changing cts state
The uart_handle_cts_change() function in serial_core expects the caller
to hold uport->lock. For example, I have seen the below kernel splat,
when the Bluetooth driver is loaded on an i.MX28 board.
[ 85.119255] ------------[ cut here ]------------
[ 85.124413] WARNING: CPU: 0 PID: 27 at /drivers/tty/serial/serial_core.c:3453 uart_handle_cts_change+0xb4/0xec
[ 85.134694…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages3 packages
▶CVEListV5linux/linux4d90bb147ef6b91f529a21b498ff2b5fdc6785b4 — 56434e295bd446142025913bfdf1587f5e1970ad+8
Also affects: Debian Linux 10.0, Fedora 38, 39, 40
Patches
🔴Vulnerability Details
3OSV▶
CVE-2024-27000: In the Linux kernel, the following vulnerability has been resolved: serial: mxs-auart: add spinlock around changing cts state The uart_handle_cts_chan↗2024-05-01
GHSA▶
GHSA-pxvx-632v-2p4v: In the Linux kernel, the following vulnerability has been resolved:
serial: mxs-auart: add spinlock around changing cts state
The uart_handle_cts_ch↗2024-05-01
📋Vendor Advisories
20💬Community
1Bugzilla
▶