๐Ÿ” CVE Alert

CVE-2024-56701

UNKNOWN 0.0

powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore The dtl_access_lock needs to be a rw_sempahore, a sleeping lock, because the code calls kmalloc() while holding it, which can sleep: # echo 1 > /proc/powerpc/vcpudispatch_stats BUG: sleeping function called from invalid context at include/linux/sched/mm.h:337 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 199, name: sh preempt_count: 1, expected: 0 3 locks held by sh/199: #0: c00000000a0743f8 (sb_writers#3){.+.+}-{0:0}, at: vfs_write+0x324/0x438 #1: c0000000028c7058 (dtl_enable_mutex){+.+.}-{3:3}, at: vcpudispatch_stats_write+0xd4/0x5f4 #2: c0000000028c70b8 (dtl_access_lock){+.+.}-{2:2}, at: vcpudispatch_stats_write+0x220/0x5f4 CPU: 0 PID: 199 Comm: sh Not tainted 6.10.0-rc4 #152 Hardware name: IBM pSeries (emulated by qemu) POWER9 (raw) 0x4e1202 0xf000005 of:SLOF,HEAD hv:linux,kvm pSeries Call Trace: dump_stack_lvl+0x130/0x148 (unreliable) __might_resched+0x174/0x410 kmem_cache_alloc_noprof+0x340/0x3d0 alloc_dtl_buffers+0x124/0x1ac vcpudispatch_stats_write+0x2a8/0x5f4 proc_reg_write+0xf4/0x150 vfs_write+0xfc/0x438 ksys_write+0x88/0x148 system_call_exception+0x1c4/0x5a0 system_call_common+0xf4/0x258

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 28, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
06220d78f24a20549757be1014e57c382406cc92 < 6956c0e7346ce1bbfc726755aa8da10d26e84276 06220d78f24a20549757be1014e57c382406cc92 < f6ec133668757f84e5143f1eb141fd0b83778b9e 06220d78f24a20549757be1014e57c382406cc92 < fa5b5ea257135e771b489c83a2e93b5935d0108e 06220d78f24a20549757be1014e57c382406cc92 < a246daa26b717e755ccc9061f47f7cd1c0b358dd 06220d78f24a20549757be1014e57c382406cc92 < b125d0cf1adde7b2b47d7337fed7e9133eea3463 06220d78f24a20549757be1014e57c382406cc92 < 525e18f1ba7c2b098c8ba587fb397efb34a6574c 06220d78f24a20549757be1014e57c382406cc92 < cadae3a45d23aa4f6485938a67cbc47aaaa25e38
Linux / Linux
5.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/6956c0e7346ce1bbfc726755aa8da10d26e84276 git.kernel.org: https://git.kernel.org/stable/c/f6ec133668757f84e5143f1eb141fd0b83778b9e git.kernel.org: https://git.kernel.org/stable/c/fa5b5ea257135e771b489c83a2e93b5935d0108e git.kernel.org: https://git.kernel.org/stable/c/a246daa26b717e755ccc9061f47f7cd1c0b358dd git.kernel.org: https://git.kernel.org/stable/c/b125d0cf1adde7b2b47d7337fed7e9133eea3463 git.kernel.org: https://git.kernel.org/stable/c/525e18f1ba7c2b098c8ba587fb397efb34a6574c git.kernel.org: https://git.kernel.org/stable/c/cadae3a45d23aa4f6485938a67cbc47aaaa25e38 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html