Executive Summary

Informations
Name CVE-2024-42268 First vendor Publication 2024-08-17
Vendor Cve Last vendor Modification 2024-08-19

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix missing lock on sync reset reload

On sync reset reload work, when remote host updates devlink on reload actions performed on that host, it misses taking devlink lock before calling devlink_remote_reload_actions_performed() which results in triggering lock assert like the following:

WARNING: CPU: 4 PID: 1164 at net/devlink/core.c:261 devl_assert_locked+0x3e/0x50 …
CPU: 4 PID: 1164 Comm: kworker/u96:6 Tainted: G S W 6.10.0-rc2+ #116
Hardware name: Supermicro SYS-2028TP-DECTR/X10DRT-PT, BIOS 2.0 12/18/2015
Workqueue: mlx5_fw_reset_events mlx5_sync_reset_reload_work [mlx5_core]
RIP: 0010:devl_assert_locked+0x3e/0x50 …
Call Trace:

? __warn+0xa4/0x210
? devl_assert_locked+0x3e/0x50
? report_bug+0x160/0x280
? handle_bug+0x3f/0x80
? exc_invalid_op+0x17/0x40
? asm_exc_invalid_op+0x1a/0x20
? devl_assert_locked+0x3e/0x50
devlink_notify+0x88/0x2b0
? mlx5_attach_device+0x20c/0x230 [mlx5_core]
? __pfx_devlink_notify+0x10/0x10
? process_one_work+0x4b6/0xbb0
process_one_work+0x4b6/0xbb0 […]

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42268

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-667 Insufficient Locking

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3646

Sources (Detail)

https://git.kernel.org/stable/c/091268f3c27a5b6d7858a3bb2a0dbcc9cd26ddb5
https://git.kernel.org/stable/c/572f9caa9e7295f8c8822e4122c7ae8f1c412ff9
https://git.kernel.org/stable/c/5d07d1d40aabfd61bab21115639bd4f641db6002
https://git.kernel.org/stable/c/98884e89c90d077f6fe6ba18e6cf6f914642f04e
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Date Informations
2025-01-08 03:04:16
  • Multiple Updates
2025-01-07 03:03:49
  • Multiple Updates
2024-12-25 03:02:27
  • Multiple Updates
2024-12-12 03:05:23
  • Multiple Updates
2024-11-23 03:02:27
  • Multiple Updates
2024-11-22 03:00:38
  • Multiple Updates
2024-11-20 02:58:58
  • Multiple Updates
2024-11-14 02:59:17
  • Multiple Updates
2024-11-09 02:59:18
  • Multiple Updates
2024-10-26 02:56:42
  • Multiple Updates
2024-10-25 02:58:36
  • Multiple Updates
2024-10-23 02:57:49
  • Multiple Updates
2024-10-03 02:53:07
  • Multiple Updates
2024-10-02 02:51:31
  • Multiple Updates
2024-09-15 02:49:13
  • Multiple Updates
2024-09-12 02:48:45
  • Multiple Updates
2024-09-07 02:47:44
  • Multiple Updates
2024-09-06 02:46:54
  • Multiple Updates
2024-09-04 02:50:07
  • Multiple Updates
2024-08-22 02:47:58
  • Multiple Updates
2024-08-20 00:27:37
  • Multiple Updates
2024-08-19 17:27:25
  • Multiple Updates
2024-08-17 13:27:30
  • First insertion