-
CVE-2024-35819
- EPSS 0.07%
- Veröffentlicht 17.05.2024 14:15:16
- Zuletzt bearbeitet 21.11.2024 09:20:58
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: soc: fsl: qbman: Use raw spinlock for cgr_lock smp_call_function always runs its callback in hard IRQ context, even on PREEMPT_RT, where spinlocks can sleep. So we need to use a raw spinlock for cgr_lock to ensure we aren't waiting on a sleeping task. Although this bug has existed for a while, it was not apparent until commit ef2a8d5478b9 ("net: dpaa: Adjust queue depth on rate change") which invokes smp_call_function_single via qman_update_cgr_safe every time a link goes up or down.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
2b3fede8225133671ce837c0d284804aa3bc7a02
Version
96f413f47677366e0ae03797409bfcc4151dbf9e
Status
affected
Version <
ff50716b7d5b7985979a5b21163cd79fb3d21d59
Version
96f413f47677366e0ae03797409bfcc4151dbf9e
Status
affected
Version <
32edca2f03a6cc42c650ddc3ad83d086e3f365d1
Version
96f413f47677366e0ae03797409bfcc4151dbf9e
Status
affected
Version <
9a3ca8292ce9fdcce122706c28c3f07bc857fe5e
Version
96f413f47677366e0ae03797409bfcc4151dbf9e
Status
affected
Version <
d6b5aac451c9cc12e43ab7308e0e2ddc52c62c14
Version
96f413f47677366e0ae03797409bfcc4151dbf9e
Status
affected
Version <
54d26adf64c04f186098b39dba86b86037084baa
Version
96f413f47677366e0ae03797409bfcc4151dbf9e
Status
affected
Version <
f39d36b7540cf0088ed7ce2de2794f2aa237f6df
Version
96f413f47677366e0ae03797409bfcc4151dbf9e
Status
affected
Version <
cd53a8ae5aacb4ecd25088486dea1cd02e74b506
Version
96f413f47677366e0ae03797409bfcc4151dbf9e
Status
affected
Version <
fbec4e7fed89b579f2483041fabf9650fb0dd6bc
Version
96f413f47677366e0ae03797409bfcc4151dbf9e
Status
affected
Version
a85c525bbff4d7467d7f0ab6fed8e2f787b073d6
Status
affected
Version
29cd9c2d1f428c281962135ea046a9d7bda88d14
Status
affected
Version
5b10a404419f0532ef3ba990c12bebe118adb6d7
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.16
Status
affected
Version <
4.16
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.312
Status
unaffected
Version <=
5.4.*
Version
5.4.274
Status
unaffected
Version <=
5.10.*
Version
5.10.215
Status
unaffected
Version <=
5.15.*
Version
5.15.154
Status
unaffected
Version <=
6.1.*
Version
6.1.84
Status
unaffected
Version <=
6.6.*
Version
6.6.24
Status
unaffected
Version <=
6.7.*
Version
6.7.12
Status
unaffected
Version <=
6.8.*
Version
6.8.3
Status
unaffected
Version <=
*
Version
6.9
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.21 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|