2024-07-29 16:01:09 +00:00
{
2024-07-30 08:01:06 +00:00
"data_version" : "4.0" ,
2024-07-29 16:01:09 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2024-42140" ,
2024-07-30 08:01:06 +00:00
"ASSIGNER" : "cve@kernel.org" ,
"STATE" : "PUBLIC"
2024-07-29 16:01:09 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-07-30 08:01:06 +00:00
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: kexec: Avoid deadlock in kexec crash path\n\nIf the kexec crash code is called in the interrupt context, the\nmachine_kexec_mask_interrupts() function will trigger a deadlock while\ntrying to acquire the irqdesc spinlock and then deactivate irqchip in\nirq_set_irqchip_state() function.\n\nUnlike arm64, riscv only requires irq_eoi handler to complete EOI and\nkeeping irq_set_irqchip_state() will only leave this possible deadlock\nwithout any use. So we simply remove it."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Linux" ,
"product" : {
"product_data" : [
{
"product_name" : "Linux" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "12f237200c16" ,
"version_value" : "bb80a7911218"
} ,
{
"version_affected" : "<" ,
"version_name" : "b17d19a5314a" ,
"version_value" : "653deee48a46"
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "6.1" ,
"status" : "affected"
} ,
{
"version" : "0" ,
"lessThan" : "6.1" ,
"status" : "unaffected" ,
"versionType" : "custom"
} ,
{
"version" : "5.15.163" ,
"lessThanOrEqual" : "5.15.*" ,
"status" : "unaffected" ,
"versionType" : "custom"
} ,
{
"version" : "6.1.98" ,
"lessThanOrEqual" : "6.1.*" ,
"status" : "unaffected" ,
"versionType" : "custom"
} ,
{
"version" : "6.6.39" ,
"lessThanOrEqual" : "6.6.*" ,
"status" : "unaffected" ,
"versionType" : "custom"
} ,
{
"version" : "6.9.9" ,
"lessThanOrEqual" : "6.9.*" ,
"status" : "unaffected" ,
"versionType" : "custom"
} ,
{
"version" : "6.10" ,
"lessThanOrEqual" : "*" ,
"status" : "unaffected" ,
"versionType" : "original_commit_for_fix"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://git.kernel.org/stable/c/bb80a7911218bbab2a69b5db7d2545643ab0073d" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/bb80a7911218bbab2a69b5db7d2545643ab0073d"
} ,
{
"url" : "https://git.kernel.org/stable/c/653deee48a4682ea17a05b96fb6842795ab5943c" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/653deee48a4682ea17a05b96fb6842795ab5943c"
} ,
{
"url" : "https://git.kernel.org/stable/c/7692c9b6baacdee378435f58f19baf0eb69e4155" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/7692c9b6baacdee378435f58f19baf0eb69e4155"
} ,
{
"url" : "https://git.kernel.org/stable/c/484dd545271d02d1571e1c6b62ea7df9dbe5e692" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/484dd545271d02d1571e1c6b62ea7df9dbe5e692"
} ,
{
"url" : "https://git.kernel.org/stable/c/c562ba719df570c986caf0941fea2449150bcbc4" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/c562ba719df570c986caf0941fea2449150bcbc4"
2024-07-29 16:01:09 +00:00
}
]
2024-07-30 08:01:06 +00:00
} ,
"generator" : {
"engine" : "bippy-c9c4e1df01b2"
2024-07-29 16:01:09 +00:00
}
}