CVE-2024-27023 Affecting kernel-modules-extra package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-KERNELMODULESEXTRA-6776158
- published 2 May 2024
- disclosed 1 May 2024
Introduced: 1 May 2024
CVE-2024-27023 Open this link in a new tabHow to fix?
There is no fixed version for Centos:8
kernel-modules-extra
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-modules-extra
package and not the kernel-modules-extra
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
md: Fix missing release of 'active_io' for flush
submit_flushes atomic_set(&mddev->flush_pending, 1); rdev_for_each_rcu(rdev, mddev) atomic_inc(&mddev->flush_pending); bi->bi_end_io = md_end_flush submit_bio(bi); /* flush io is done first */ md_end_flush if (atomic_dec_and_test(&mddev->flush_pending)) percpu_ref_put(&mddev->active_io) -> active_io is not released
if (atomic_dec_and_test(&mddev->flush_pending)) -> missing release of active_io
For consequence, mddev_suspend() will wait for 'active_io' to be zero forever.
Fix this problem by releasing 'active_io' in submit_flushes() if 'flush_pending' is decreased to zero.
References
- https://access.redhat.com/security/cve/CVE-2024-27023
- https://git.kernel.org/stable/c/02dad157ba11064d073f5499dc33552b227d5d3a
- https://git.kernel.org/stable/c/11f81438927f84edfaaeb5d5f10856c3a1c1fc82
- https://git.kernel.org/stable/c/6b2ff10390b19a2364af622b6666b690443f9f3f
- https://git.kernel.org/stable/c/855678ed8534518e2b428bcbcec695de9ba248e8