CVE-2024-35819

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35819
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35819.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-35819
Downstream
Related
Published
2024-05-17T13:23:23.031Z
Modified
2025-11-28T02:35:42.940166Z
Summary
soc: fsl: qbman: Use raw spinlock for cgr_lock
Details

In the Linux kernel, the following vulnerability has been resolved:

soc: fsl: qbman: Use raw spinlock for cgr_lock

smpcallfunction always runs its callback in hard IRQ context, even on PREEMPTRT, where spinlocks can sleep. So we need to use a raw spinlock for cgrlock to ensure we aren't waiting on a sleeping task.

Although this bug has existed for a while, it was not apparent until commit ef2a8d5478b9 ("net: dpaa: Adjust queue depth on rate change") which invokes smpcallfunctionsingle via qmanupdatecgrsafe every time a link goes up or down.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35819.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
96f413f47677366e0ae03797409bfcc4151dbf9e
Fixed
2b3fede8225133671ce837c0d284804aa3bc7a02
Fixed
ff50716b7d5b7985979a5b21163cd79fb3d21d59
Fixed
32edca2f03a6cc42c650ddc3ad83d086e3f365d1
Fixed
9a3ca8292ce9fdcce122706c28c3f07bc857fe5e
Fixed
d6b5aac451c9cc12e43ab7308e0e2ddc52c62c14
Fixed
54d26adf64c04f186098b39dba86b86037084baa
Fixed
f39d36b7540cf0088ed7ce2de2794f2aa237f6df
Fixed
cd53a8ae5aacb4ecd25088486dea1cd02e74b506
Fixed
fbec4e7fed89b579f2483041fabf9650fb0dd6bc
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
a85c525bbff4d7467d7f0ab6fed8e2f787b073d6
Last affected
29cd9c2d1f428c281962135ea046a9d7bda88d14
Last affected
5b10a404419f0532ef3ba990c12bebe118adb6d7

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.16.0
Fixed
4.19.312
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.274
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.215
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.154
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.84
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.24
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.12
Type
ECOSYSTEM
Events
Introduced
6.8.0
Fixed
6.8.3