CVE-2024-27005 — Race Condition in Linux
Severity
6.3MEDIUMNVD
OSV6.8
EPSS
0.0%
top 99.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 1
Latest updateJul 26
Description
In the Linux kernel, the following vulnerability has been resolved:
interconnect: Don't access req_list while it's being manipulated
The icc_lock mutex was split into separate icc_lock and icc_bw_lock
mutexes in [1] to avoid lockdep splats. However, this didn't adequately
protect access to icc_node::req_list.
The icc_set_bw() function will eventually iterate over req_list while
only holding icc_bw_lock, but req_list can be modified while only
holding icc_lock. This causes races between icc_se…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.0 | Impact: 5.2
Affected Packages12 packages
▶CVEListV5linux/linux9be2957f014d91088db1eb5dd09d9a03d7184dce — fe549d8e976300d0dd75bd904eb216bed8b145e0+6
Patches
🔴Vulnerability Details
6OSV▶
linux, linux-azure, linux-gcp, linux-ibm, linux-intel, linux-lowlatency, linux-oem-6.8, linux-raspi vulnerabilities↗2024-07-11
OSV▶
CVE-2024-27005: In the Linux kernel, the following vulnerability has been resolved: interconnect: Don't access req_list while it's being manipulated The icc_lock mute↗2024-05-01
📋Vendor Advisories
7💬Community
1Bugzilla▶
CVE-2024-27005 kernel: interconnect: Don't access req_list while it's being manipulated↗2024-05-01