First published: Wed Jun 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: eth: sungem: remove .ndo_poll_controller to avoid deadlocks Erhard reports netpoll warnings from sungem: netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398) WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c gem_poll_controller() disables interrupts, which may sleep. We can't sleep in netpoll, it has interrupts disabled completely. Strangely, gem_poll_controller() doesn't even poll the completions, and instead acts as if an interrupt has fired so it just schedules NAPI and exits. None of this has been necessary for years, since netpoll invokes NAPI directly.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.1<5.10.219 | |
Linux Kernel | >=5.11<5.15.161 | |
Linux Kernel | >=5.16<6.1.93 | |
Linux Kernel | >=6.2<6.6.33 | |
Linux Kernel | >=6.7<6.8.12 | |
Linux Kernel | >=6.9<6.9.3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38597 is classified as a low severity vulnerability in the Linux kernel.
To remediate CVE-2024-38597, update the Linux kernel to versions 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.11-1, or 6.12.12-1.
CVE-2024-38597 affects multiple versions of the Linux kernel, ranging from 3.1 to 6.9.3.
Users may experience netpoll warnings and potential deadlocks in the sungem Ethernet driver due to this vulnerability.
CVE-2024-38597 is primarily a local vulnerability affecting systems with specific configurations of the Linux kernel.