First published: Wed Sep 11 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Take state lock during tx timeout reporter mlx5e_safe_reopen_channels() requires the state lock taken. The referenced changed in the Fixes tag removed the lock to fix another issue. This patch adds it back but at a later point (when calling mlx5e_safe_reopen_channels()) to avoid the deadlock referenced in the Fixes tag.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.1.69<6.1.107 | |
Linux Kernel | >=6.6.8<6.6.48 | |
Linux Kernel | >=6.7<6.10.7 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
Linux Kernel | =6.11-rc3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 | |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45019 has a moderate severity due to its impact on the Linux kernel networking stack.
To fix CVE-2024-45019, update to the patched versions of the Linux kernel, such as 5.10.223-1 or 6.12.11-1.
CVE-2024-45019 affects Linux kernel versions ranging from 6.1.69 to 6.1.107, as well as specific release candidates.
As of now, there is no indication that CVE-2024-45019 is being actively exploited in the wild.
CVE-2024-45019 affects the mlx5e networking driver in the Linux kernel.