First published: Wed Jun 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ALSA: Fix deadlocks with kctl removals at disconnection In snd_card_disconnect(), we set card->shutdown flag at the beginning, call callbacks and do sync for card->power_ref_sleep waiters at the end. The callback may delete a kctl element, and this can lead to a deadlock when the device was in the suspended state. Namely: * A process waits for the power up at snd_power_ref_and_wait() in snd_ctl_info() or read/write() inside card->controls_rwsem. * The system gets disconnected meanwhile, and the driver tries to delete a kctl via snd_ctl_remove*(); it tries to take card->controls_rwsem again, but this is already locked by the above. Since the sleeper isn't woken up, this deadlocks. An easy fix is to wake up sleepers before processing the driver disconnect callbacks but right after setting the card->shutdown flag. Then all sleepers will abort immediately, and the code flows again. So, basically this patch moves the wait_event() call at the right timing. While we're at it, just to be sure, call wait_event_all() instead of wait_event(), although we don't use exclusive events on this queue for now.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.15.161 | 5.15.161 |
redhat/kernel | <6.1.93 | 6.1.93 |
redhat/kernel | <6.6.33 | 6.6.33 |
redhat/kernel | <6.8.12 | 6.8.12 |
redhat/kernel | <6.9.3 | 6.9.3 |
redhat/kernel | <6.10 | 6.10 |
Linux kernel | <5.15.161 | |
Linux kernel | >=5.16<6.1.93 | |
Linux kernel | >=6.2<6.6.33 | |
Linux kernel | >=6.7<6.8.12 | |
Linux kernel | >=6.9<6.9.3 | |
Linux Kernel | <5.15.161 | |
Linux Kernel | >=5.16<6.1.93 | |
Linux Kernel | >=6.2<6.6.33 | |
Linux Kernel | >=6.7<6.8.12 | |
Linux Kernel | >=6.9<6.9.3 | |
debian/linux | <=5.10.223-1<=5.10.234-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38600 has been classified as a moderate severity vulnerability.
To fix CVE-2024-38600, update the Linux kernel to version 5.15.161 or later, or to an appropriate version as specified by your distribution.
CVE-2024-38600 affects Linux kernel versions prior to 5.15.161, as well as various versions of 6.x up to 6.10.
CVE-2024-38600 impacts the ALSA subsystem in the Linux kernel, specifically during sound card disconnection events.
As of the latest updates, there are no confirmed reports of CVE-2024-38600 being actively exploited in the wild.