DEBIAN-CVE-2024-41036

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2024-41036
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-41036.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-41036
Upstream
Published
2024-07-29T15:15:12Z
Modified
2025-09-19T07:35:11.744176Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: net: ks8851: Fix deadlock with the SPI chip variant When SMP is enabled and spinlocks are actually functional then there is a deadlock with the 'statelock' spinlock between ks8851startxmitspi and ks8851irq: watchdog: BUG: soft lockup - CPU#0 stuck for 27s! call trace: queuedspinlockslowpath+0x100/0x284 dorawspinlock+0x34/0x44 ks8851startxmitspi+0x30/0xb8 ks8851startxmit+0x14/0x20 netdevstartxmit+0x40/0x6c devhardstartxmit+0x6c/0xbc schdirectxmit+0xa4/0x22c qdiscrun+0x138/0x3fc qdiscrun+0x24/0x3c nettxaction+0xf8/0x130 handlesoftirqs+0x1ac/0x1f0 _dosoftirq+0x14/0x20 _dosoftirq+0x10/0x1c callonirqstack+0x3c/0x58 dosoftirqownstack+0x1c/0x28 _irqexitrcu+0x54/0x9c irqexitrcu+0x10/0x1c el1interrupt+0x38/0x50 el1h64irqhandler+0x18/0x24 el1h64irq+0x64/0x68 _netifschedule+0x6c/0x80 netiftxwakequeue+0x38/0x48 ks8851irq+0xb8/0x2c8 irqthreadfn+0x2c/0x74 irqthread+0x10c/0x1b0 kthread+0xc8/0xd8 retfromfork+0x10/0x20 This issue has not been identified earlier because tests were done on a device with SMP disabled and so spinlocks were actually NOPs. Now use spin(un)lock_bh for TX queue related locking to avoid execution of softirq work synchronously that would lead to a deadlock.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.106-1

Affected versions

6.*

6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4
6.1.52-1
6.1.55-1~bpo11+1
6.1.55-1
6.1.64-1
6.1.66-1
6.1.67-1
6.1.69-1~bpo11+1
6.1.69-1
6.1.76-1~bpo11+1
6.1.76-1
6.1.82-1
6.1.85-1
6.1.90-1~bpo11+1
6.1.90-1
6.1.94-1~bpo11+1
6.1.94-1
6.1.98-1
6.1.99-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.9.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.9.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:11 / linux-6.1

Package

Name
linux-6.1
Purl
pkg:deb/debian/linux-6.1?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.119-1~deb11u1

Affected versions

6.*

6.1.106-3~deb11u1
6.1.106-3~deb11u2
6.1.106-3~deb11u3
6.1.112-1~deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}