cve-2024-47739
Vulnerability from cvelistv5
Published
2024-10-21 12:14
Modified
2024-12-19 09:27
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: padata: use integer wrap around to prevent deadlock on seq_nr overflow When submitting more than 2^32 padata objects to padata_do_serial, the current sorting implementation incorrectly sorts padata objects with overflowed seq_nr, causing them to be placed before existing objects in the reorder list. This leads to a deadlock in the serialization process as padata_find_next cannot match padata->seq_nr and pd->processed because the padata instance with overflowed seq_nr will be selected next. To fix this, we use an unsigned integer wrap around to correctly sort padata objects in scenarios with integer overflow.
Impacted products
Vendor Product Version
Linux Linux Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Create a notification for this product.
   Linux Linux Version: 5.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-47739",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-21T12:59:27.799629Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T13:04:14.713Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "kernel/padata.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "46c4079460f4dcaf445860679558eedef4e1bc91",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "72164d5b648951684b1a593996b37a6083c61d7d",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "ab205e1c3846326f162180e56825b4ba38ce9c30",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "1b8cf11b3ca593a8802a51802cd0c28c38501428",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "9e279e6c1f012b82628b89e1b9c65dbefa8ca25a",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "1bd712de96ad7167fe0d608e706cd60587579f16",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "9a22b2812393d93d84358a760c347c21939029a6",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "kernel/padata.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.4"
            },
            {
              "lessThan": "5.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.227",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.168",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.113",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.54",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.12",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: use integer wrap around to prevent deadlock on seq_nr overflow\n\nWhen submitting more than 2^32 padata objects to padata_do_serial, the\ncurrent sorting implementation incorrectly sorts padata objects with\noverflowed seq_nr, causing them to be placed before existing objects in\nthe reorder list. This leads to a deadlock in the serialization process\nas padata_find_next cannot match padata-\u003eseq_nr and pd-\u003eprocessed\nbecause the padata instance with overflowed seq_nr will be selected\nnext.\n\nTo fix this, we use an unsigned integer wrap around to correctly sort\npadata objects in scenarios with integer overflow."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:27:08.914Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/46c4079460f4dcaf445860679558eedef4e1bc91"
        },
        {
          "url": "https://git.kernel.org/stable/c/72164d5b648951684b1a593996b37a6083c61d7d"
        },
        {
          "url": "https://git.kernel.org/stable/c/ab205e1c3846326f162180e56825b4ba38ce9c30"
        },
        {
          "url": "https://git.kernel.org/stable/c/1b8cf11b3ca593a8802a51802cd0c28c38501428"
        },
        {
          "url": "https://git.kernel.org/stable/c/9e279e6c1f012b82628b89e1b9c65dbefa8ca25a"
        },
        {
          "url": "https://git.kernel.org/stable/c/1bd712de96ad7167fe0d608e706cd60587579f16"
        },
        {
          "url": "https://git.kernel.org/stable/c/9a22b2812393d93d84358a760c347c21939029a6"
        }
      ],
      "title": "padata: use integer wrap around to prevent deadlock on seq_nr overflow",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-47739",
    "datePublished": "2024-10-21T12:14:08.495Z",
    "dateReserved": "2024-09-30T16:00:12.959Z",
    "dateUpdated": "2024-12-19T09:27:08.914Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-47739\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T13:15:04.017\",\"lastModified\":\"2024-10-23T16:58:37.707\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\npadata: use integer wrap around to prevent deadlock on seq_nr overflow\\n\\nWhen submitting more than 2^32 padata objects to padata_do_serial, the\\ncurrent sorting implementation incorrectly sorts padata objects with\\noverflowed seq_nr, causing them to be placed before existing objects in\\nthe reorder list. This leads to a deadlock in the serialization process\\nas padata_find_next cannot match padata-\u003eseq_nr and pd-\u003eprocessed\\nbecause the padata instance with overflowed seq_nr will be selected\\nnext.\\n\\nTo fix this, we use an unsigned integer wrap around to correctly sort\\npadata objects in scenarios with integer overflow.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: padata: usar un envoltorio de enteros para evitar un bloqueo en el desbordamiento de seq_nr Al enviar m\u00e1s de 2^32 objetos padata a padata_do_serial, la implementaci\u00f3n de clasificaci\u00f3n actual ordena incorrectamente los objetos padata con seq_nr desbordado, lo que hace que se coloquen antes de los objetos existentes en la lista de reordenamiento. Esto conduce a un bloqueo en el proceso de serializaci\u00f3n ya que padata_find_next no puede coincidir con padata-\u0026gt;seq_nr y pd-\u0026gt;processed porque la instancia de padata con seq_nr desbordado se seleccionar\u00e1 a continuaci\u00f3n. Para solucionar esto, usamos un envoltorio de enteros sin signo para ordenar correctamente los objetos padata en escenarios con desbordamiento de enteros.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4\",\"versionEndExcluding\":\"5.10.227\",\"matchCriteriaId\":\"114E45ED-C336-4B21-B1A8-759F9542EC7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"4D51C05D-455B-4D8D-89E7-A58E140B864C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.54\",\"matchCriteriaId\":\"D448821D-C085-4CAF-88FA-2DDE7BE21976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.13\",\"matchCriteriaId\":\"CE94BB8D-B0AB-4563-9ED7-A12122B56EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.2\",\"matchCriteriaId\":\"AB755D26-97F4-43B6-8604-CD076811E181\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1b8cf11b3ca593a8802a51802cd0c28c38501428\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1bd712de96ad7167fe0d608e706cd60587579f16\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/46c4079460f4dcaf445860679558eedef4e1bc91\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/72164d5b648951684b1a593996b37a6083c61d7d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9a22b2812393d93d84358a760c347c21939029a6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9e279e6c1f012b82628b89e1b9c65dbefa8ca25a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ab205e1c3846326f162180e56825b4ba38ce9c30\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47739\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-21T12:59:27.799629Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-21T12:59:30.940Z\"}}], \"cna\": {\"title\": \"padata: use integer wrap around to prevent deadlock on seq_nr overflow\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"46c4079460f4dcaf445860679558eedef4e1bc91\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"72164d5b648951684b1a593996b37a6083c61d7d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"ab205e1c3846326f162180e56825b4ba38ce9c30\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"1b8cf11b3ca593a8802a51802cd0c28c38501428\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"9e279e6c1f012b82628b89e1b9c65dbefa8ca25a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"1bd712de96ad7167fe0d608e706cd60587579f16\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"9a22b2812393d93d84358a760c347c21939029a6\", \"versionType\": \"git\"}], \"programFiles\": [\"kernel/padata.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.4\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.4\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.227\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.54\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.13\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"kernel/padata.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/46c4079460f4dcaf445860679558eedef4e1bc91\"}, {\"url\": \"https://git.kernel.org/stable/c/72164d5b648951684b1a593996b37a6083c61d7d\"}, {\"url\": \"https://git.kernel.org/stable/c/ab205e1c3846326f162180e56825b4ba38ce9c30\"}, {\"url\": \"https://git.kernel.org/stable/c/1b8cf11b3ca593a8802a51802cd0c28c38501428\"}, {\"url\": \"https://git.kernel.org/stable/c/9e279e6c1f012b82628b89e1b9c65dbefa8ca25a\"}, {\"url\": \"https://git.kernel.org/stable/c/1bd712de96ad7167fe0d608e706cd60587579f16\"}, {\"url\": \"https://git.kernel.org/stable/c/9a22b2812393d93d84358a760c347c21939029a6\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\npadata: use integer wrap around to prevent deadlock on seq_nr overflow\\n\\nWhen submitting more than 2^32 padata objects to padata_do_serial, the\\ncurrent sorting implementation incorrectly sorts padata objects with\\noverflowed seq_nr, causing them to be placed before existing objects in\\nthe reorder list. This leads to a deadlock in the serialization process\\nas padata_find_next cannot match padata-\u003eseq_nr and pd-\u003eprocessed\\nbecause the padata instance with overflowed seq_nr will be selected\\nnext.\\n\\nTo fix this, we use an unsigned integer wrap around to correctly sort\\npadata objects in scenarios with integer overflow.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:27:08.914Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-47739\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:27:08.914Z\", \"dateReserved\": \"2024-09-30T16:00:12.959Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T12:14:08.495Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.