CVE-2024-35808
MEDIUMLinux Kernel < 6.7.12 - Improper Locking
Title source: ruleDescription
In the Linux kernel, the following vulnerability has been resolved: md/dm-raid: don't call md_reap_sync_thread() directly Currently md_reap_sync_thread() is called from raid_message() directly without holding 'reconfig_mutex', this is definitely unsafe because md_reap_sync_thread() can change many fields that is protected by 'reconfig_mutex'. However, hold 'reconfig_mutex' here is still problematic because this will cause deadlock, for example, commit 130443d60b1b ("md: refactor idle/frozen_sync_thread() to fix deadlock"). Fix this problem by using stop_sync_thread() to unregister sync_thread, like md/raid did.
Scores
CVSS v3
5.5
EPSS
0.0001
EPSS Percentile
0.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Classification
CWE
CWE-667
Status
published
Affected Products (3)
linux/linux_kernel
< 6.7.12
linux/Kernel
< 6.7.12linux
linux/Kernel
< 6.8.3linux
Timeline
Published
May 17, 2024
Tracked Since
Feb 18, 2026