CVE-2024-50249

Source
https://cve.org/CVERecord?id=CVE-2024-50249
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50249.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50249
Downstream
Related
Published
2024-11-09T10:14:57.833Z
Modified
2026-03-20T12:38:15.754098Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ACPI: CPPC: Make rmw_lock a raw_spin_lock
Details

In the Linux kernel, the following vulnerability has been resolved:

ACPI: CPPC: Make rmwlock a rawspin_lock

The following BUG was triggered:

============================= [ BUG: Invalid wait context ]

6.12.0-rc2-XXX #406 Not tainted

kworker/1:1/62 is trying to lock: ffffff8801593030 (&cpcptr->rmwlock){+.+.}-{3:3}, at: cpc_write+0xcc/0x370 other info that might help us debug this: context-{5:5} 2 locks held by kworker/1:1/62: #0: ffffff897ef5ec98 (&rq->__lock){-.-.}-{2:2}, at: rawspinrqlocknested+0x2c/0x50 #1: ffffff880154e238 (&sgpolicy->updatelock){....}-{2:2}, at: sugovupdateshared+0x3c/0x280 stack backtrace: CPU: 1 UID: 0 PID: 62 Comm: kworker/1:1 Not tainted 6.12.0-rc2-g9654bd3e8806 #406 Workqueue: 0x0 (events) Call trace: dumpbacktrace+0xa4/0x130 showstack+0x20/0x38 dumpstacklvl+0x90/0xd0 dump_stack+0x18/0x28 __lockacquire+0x480/0x1ad8 lockacquire+0x114/0x310 rawspinlock+0x50/0x70 cpcwrite+0xcc/0x370 cppcsetperf+0xa0/0x3a8 cppccpufreqfastswitch+0x40/0xc0 cpufreqdriverfastswitch+0x4c/0x218 sugovupdateshared+0x234/0x280 updateloadavg+0x6ec/0x7b8 dequeueentities+0x108/0x830 dequeuetask_fair+0x58/0x408 _schedule+0x4f0/0x1070 schedule+0x54/0x130 workerthread+0xc0/0x2e8 kthread+0x130/0x148 retfromfork+0x10/0x20

sugovupdateshared() locks a rawspinlock while cpcwrite() locks a spinlock.

To have a correct wait-type order, update rmw_lock to a raw spinlock and ensure that interrupts will be disabled on the CPU holding it.

[ rjw: Changelog edits ]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50249.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
94e8c988468dafde1d2bfe0532a60a3117f6394b
Fixed
c46d6b02588000c27b7b869388c2c0278bd0d173
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f812ca13a0d3e3aa418da36b66ca40df0d6f9e60
Fixed
23039b4aaf1e82e0feea1060834d4ec34262e453
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8ad28208be7bbe748e90442c45963ddbef0fd1e2
Fixed
0eb2b767c42fac61ab23c4063eb456baa4c2c262
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
20cde05aa8bcd7a5ff36a609d813189b7cdbe692
Fixed
43b1df48d1e7000a214acd1a81b8012ca8a929c8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
60949b7b805424f21326b450ca4f1806c06d982e
Fixed
1c10941e34c5fdc0357e46a25bd130d9cf40b925
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
82cee12ada68dfd438c7faca152dbfe042868743

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50249.json"