CVE-2024-35990Improper Locking in Linux

CWE-667Improper Locking30 documents8 sources
Severity
5.5MEDIUMNVD
OSV6.5
EPSS
0.0%
top 94.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 20
Latest updateSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: dma: xilinx_dpdma: Fix locking There are several places where either chan->lock or chan->vchan.lock was not held. Add appropriate locking. This fixes lockdep warnings like [ 31.077578] ------------[ cut here ]------------ [ 31.077831] WARNING: CPU: 2 PID: 40 at drivers/dma/xilinx/xilinx_dpdma.c:834 xilinx_dpdma_chan_queue_transfer+0x274/0x5e0 [ 31.077953] Modules linked in: [ 31.078019] CPU: 2 PID: 40 Comm: kworker/u12:1 Not

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages9 packages

Patches

🔴Vulnerability Details

14
OSV
linux-xilinx-zynqmp vulnerabilities2024-09-18
OSV
linux-azure vulnerabilities2024-08-13
OSV
linux-nvidia-lowlatency, linux-oracle vulnerabilities2024-08-09
OSV
linux-lowlatency vulnerabilities2024-07-30
OSV
linux-gcp-5.15 vulnerabilities2024-07-30

📋Vendor Advisories

14
Ubuntu
Linux kernel vulnerabilities2024-09-18
Ubuntu
Linux kernel vulnerabilities2024-08-09
Ubuntu
Linux kernel vulnerabilities2024-07-30
Ubuntu
Linux kernel vulnerabilities2024-07-30
Ubuntu
Linux kernel vulnerabilities2024-07-29

💬Community

1
Bugzilla
CVE-2024-35990 kernel: dma: xilinx_dpdma: Fix locking2024-05-20