In the Linux kernel, the following vulnerability has been resolved:
md/dm-raid: don't call md_reap_sync_thread() directly
Currently md_reap_sync_thread() is called from raid_message() directly
without holding 'reconfig_mutex', this is definitely unsafe because
md_reap_sync_thread() can change many fields that is protected by
'reconfig_mutex'.
However, hold 'reconfig_mutex' here is still problematic because this
will cause deadlock, for example, commit 130443d60b1b ("md: refactor
idle/frozen_sync_thread() to fix deadlock").
Fix this problem by using stop_sync_thread() to unregister sync_thread,
like md/raid did.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-05-17 14:15
Updated : 2025-09-19 16:02
NVD link : CVE-2024-35808
Mitre link : CVE-2024-35808
CVE.ORG link : CVE-2024-35808
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking
