CVE-2024-35819

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35819
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35819.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35819
Downstream
Related
Published
2024-05-17T14:15:16Z
Modified
2025-08-09T19:01:26Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

soc: fsl: qbman: Use raw spinlock for cgr_lock

smpcallfunction always runs its callback in hard IRQ context, even on PREEMPTRT, where spinlocks can sleep. So we need to use a raw spinlock for cgrlock to ensure we aren't waiting on a sleeping task.

Although this bug has existed for a while, it was not apparent until commit ef2a8d5478b9 ("net: dpaa: Adjust queue depth on rate change") which invokes smpcallfunctionsingle via qmanupdatecgrsafe every time a link goes up or down.

References

Affected packages