In the Linux kernel, the following vulnerability has been resolved:
cpufreq: loongson3: Use rawsmpprocessorid() in doservice_request()
Use rawsmpprocessorid() instead of plain smpprocessorid() in doservice_request(), otherwise we may get some errors with the driver enabled:
BUG: using smpprocessorid() in preemptible [00000000] code: (udev-worker)/208 caller is loongson3cpufreqprobe+0x5c/0x250 [loongson3_cpufreq]
[
{
"id": "CVE-2024-50178-e722103b",
"target": {
"file": "drivers/cpufreq/loongson3_cpufreq.c"
},
"digest": {
"line_hashes": [
"49584394538980320602344583931819384622",
"67795858983006651347739762174643440405",
"275624586047453217586383196890288339297",
"219037822257859759175375136521561908442"
],
"threshold": 0.9
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2f78e4a6d2702ac03c2bf2ed3a0e344e1fa9f967",
"signature_type": "Line"
},
{
"id": "CVE-2024-50178-f99ad0ae",
"target": {
"file": "drivers/cpufreq/loongson3_cpufreq.c"
},
"digest": {
"line_hashes": [
"49584394538980320602344583931819384622",
"67795858983006651347739762174643440405",
"275624586047453217586383196890288339297",
"219037822257859759175375136521561908442"
],
"threshold": 0.9
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2b7ec33e534f7a10033a5cf07794acf48b182bbe",
"signature_type": "Line"
}
]