DEBIAN-CVE-2024-35989

Source
https://security-tracker.debian.org/tracker/CVE-2024-35989
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-35989.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-35989
Upstream
Published
2024-05-20T10:15:13Z
Modified
2025-09-19T07:33:56.698405Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms During the removal of the idxd driver, registered offline callback is invoked as part of the clean up process. However, on systems with only one CPU online, no valid target is available to migrate the perf context, resulting in a kernel oops: BUG: unable to handle page fault for address: 000000000002a2b8 #PF: supervisor write access in kernel mode #PF: errorcode(0x0002) - not-present page PGD 1470e1067 P4D 0 Oops: 0002 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 20 Comm: cpuhp/0 Not tainted 6.8.0-rc6-dsa+ #57 Hardware name: Intel Corporation AvenueCity/AvenueCity, BIOS BHSDCRB1.86B.2492.D03.2307181620 07/18/2023 RIP: 0010:mutexlock+0x2e/0x50 ... Call Trace: <TASK> die+0x24/0x70 pagefaultoops+0x82/0x160 douseraddrfault+0x65/0x6b0 _pfxrdmsrsafeoncpu+0x10/0x10 excpagefault+0x7d/0x170 asmexcpagefault+0x26/0x30 mutexlock+0x2e/0x50 mutexlock+0x1e/0x50 perfpmumigratecontext+0x87/0x1f0 perfeventcpuoffline+0x76/0x90 [idxd] cpuhpinvokecallback+0xa2/0x4f0 _pfxperfeventcpuoffline+0x10/0x10 [idxd] cpuhpthreadfun+0x98/0x150 smpbootthreadfn+0x27/0x260 smpbootthreadfn+0x1af/0x260 _pfxsmpbootthreadfn+0x10/0x10 kthread+0x103/0x140 _pfxkthread+0x10/0x10 retfromfork+0x31/0x50 _pfxkthread+0x10/0x10 retfromfork_asm+0x1b/0x30 <TASK> Fix the issue by preventing the migration of the perf context to an invalid target.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.90-1

Affected versions

6.*

6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4
6.1.52-1
6.1.55-1~bpo11+1
6.1.55-1
6.1.64-1
6.1.66-1
6.1.67-1
6.1.69-1~bpo11+1
6.1.69-1
6.1.76-1~bpo11+1
6.1.76-1
6.1.82-1
6.1.85-1
6.1.90-1~bpo11+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}