CVE-2024-36976

Source
https://cve.org/CVERecord?id=CVE-2024-36976
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-36976.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-36976
Downstream
Published
2024-06-18T19:23:52.226Z
Modified
2026-03-13T07:55:40.917545Z
Summary
Revert "media: v4l2-ctrls: show all owned controls in log_status"
Details

In the Linux kernel, the following vulnerability has been resolved:

Revert "media: v4l2-ctrls: show all owned controls in log_status"

This reverts commit 9801b5b28c6929139d6fceeee8d739cc67bb2739.

This patch introduced a potential deadlock scenario:

[Wed May 8 10:02:06 2024] Possible unsafe locking scenario:

[Wed May 8 10:02:06 2024] CPU0 CPU1 [Wed May 8 10:02:06 2024] ---- ---- [Wed May 8 10:02:06 2024] lock(vividctrls:1620:(hdlvidcap)->lock); [Wed May 8 10:02:06 2024] lock(vividctrls:1608:(hdluservid)->lock); [Wed May 8 10:02:06 2024] lock(vividctrls:1620:(hdlvidcap)->lock); [Wed May 8 10:02:06 2024] lock(vividctrls:1608:(hdluser_vid)->_lock);

For now just revert.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36976.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9801b5b28c6929139d6fceeee8d739cc67bb2739
Fixed
2e0ce54a9c5c7013b1257be044d99cbe7305e9f1
Fixed
eba63df7eb1f95df6bfb67722a35372b6994928d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-36976.json"