CVE-2024-43851Assignment to Variable without Use in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 85.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 17

Description

In the Linux kernel, the following vulnerability has been resolved: soc: xilinx: rename cpu_number1 to dummy_cpu_number The per cpu variable cpu_number1 is passed to xlnx_event_handler as argument "dev_id", but it is not used in this function. So drop the initialization of this variable and rename it to dummy_cpu_number. This patch is to fix the following call trace when the kernel option CONFIG_DEBUG_ATOMIC_SLEEP is enabled: BUG: sleeping function called from invalid context at include/linux

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

NVDlinux/linux_kernel6.1.776.1.103+3
Debianlinux/linux_kernel< 6.1.106-1+2
CVEListV5linux/linux01946c3c83b2279fec685abc83f0d7b0468851dba5e507fadab76393cbc12344ebd65a417a09aa46+5
debiandebian/linux< linux 6.1.106-1 (bookworm)
debiandebian/linux-6.1< linux 6.1.106-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-fv6p-j83c-r5q7: In the Linux kernel, the following vulnerability has been resolved: soc: xilinx: rename cpu_number1 to dummy_cpu_number The per cpu variable cpu_num2024-08-17
OSV
CVE-2024-43851: In the Linux kernel, the following vulnerability has been resolved: soc: xilinx: rename cpu_number1 to dummy_cpu_number The per cpu variable cpu_numbe2024-08-17

📋Vendor Advisories

2
Red Hat
kernel: soc: xilinx: rename cpu_number1 to dummy_cpu_number2024-08-17
Debian
CVE-2024-43851: linux - In the Linux kernel, the following vulnerability has been resolved: soc: xilinx...2024