CVE-2024-36002

Source
https://cve.org/CVERecord?id=CVE-2024-36002
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36002.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-36002
Downstream
Related
Published
2024-05-20T09:48:03.611Z
Modified
2026-03-14T12:34:06.606105Z
Summary
dpll: fix dpll_pin_on_pin_register() for multiple parent pins
Details

In the Linux kernel, the following vulnerability has been resolved:

dpll: fix dpllpinonpinregister() for multiple parent pins

In scenario where pin is registered with multiple parent pins via dpllpinonpinregister(..), all belonging to the same dpll device. A second call to dpllpinonpinunregister(..) would cause a call trace, as it tries to use already released registration resources (due to fix introduced in b446631f355e). In this scenario pin was registered twice, so resources are not yet expected to be release until each registered pin/pin pair is unregistered.

Currently, the following crash/call trace is produced when ice driver is removed on the system with installed E810T NIC which includes dpll device:

WARNING: CPU: 51 PID: 9155 at drivers/dpll/dpllcore.c:809 dpllpinops+0x20/0x30 RIP: 0010:dpllpin_ops+0x20/0x30 Call Trace: ? __warn+0x7f/0x130 ? dpllpinops+0x20/0x30 dpllmsgaddpinfreq+0x37/0x1d0 dpllcmdpingetone+0x1c0/0x400 ? __nlmsgput+0x63/0x80 dpllpineventsend+0x93/0x140 dpllpinonpinunregister+0x3f/0x100 icedplldeinitpins+0xa1/0x230 [ice] iceremove+0xf1/0x210 [ice]

Fix by adding a parent pointer as a cookie when creating a registration, also when searching for it. For the regular pins pass NULL, this allows to create separated registration for each parent the pin is registered with.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36002.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b27e32e9367dac024cd6f61f22655714f483fd67
Fixed
f3e1cf62d18220a3aa97e084e7a3552debece9fc
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b446631f355ece73b13c311dd712c47381a23172
Fixed
38d7b94e81d068b8d8c8392f421cfd2c3bbfd1a6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
769324eb35143462542cdb15483cdaf4877bf661

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36002.json"