CVE-2024-46829

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-46829
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-46829.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-46829
Downstream
Published
2024-09-27T13:15:15Z
Modified
2025-08-09T19:01:28Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

rtmutex: Drop rtmutex::waitlock before scheduling

rtmutexhandledeadlock() is called with rtmutex::wait_lock held. In the good case it returns with the lock held and in the deadlock case it emits a warning and goes into an endless scheduling loop with the lock held, which triggers the 'scheduling in atomic' warning.

Unlock rtmutex::waitlock in the dead lock case before issuing the warning and dropping into the schedule for ever loop.

[ tglx: Moved unlock before the WARN(), removed the pointless comment, massaged changelog, added Fixes tag ]

References

Affected packages