CVE-2024-35808

MEDIUM

Linux Kernel < 6.7.12 - Improper Locking

Title source: rule

Description

In the Linux kernel, the following vulnerability has been resolved: md/dm-raid: don't call md_reap_sync_thread() directly Currently md_reap_sync_thread() is called from raid_message() directly without holding 'reconfig_mutex', this is definitely unsafe because md_reap_sync_thread() can change many fields that is protected by 'reconfig_mutex'. However, hold 'reconfig_mutex' here is still problematic because this will cause deadlock, for example, commit 130443d60b1b ("md: refactor idle/frozen_sync_thread() to fix deadlock"). Fix this problem by using stop_sync_thread() to unregister sync_thread, like md/raid did.

Scores

CVSS v3 5.5
EPSS 0.0001
EPSS Percentile 0.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Classification

CWE
CWE-667
Status published

Affected Products (3)

linux/linux_kernel < 6.7.12
linux/Kernel < 6.7.12linux
linux/Kernel < 6.8.3linux

Timeline

Published May 17, 2024
Tracked Since Feb 18, 2026