vulnerability

Huawei EulerOS: CVE-2024-50135: kernel security update

Severity
4
CVSS
(AV:L/AC:M/Au:S/C:N/I:N/A:C)
Published
11/05/2024
Added
02/11/2025
Modified
02/19/2025

Description

In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix race condition between reset and nvme_dev_disable()

nvme_dev_disable() modifies the dev->online_queues field, therefore
nvme_pci_update_nr_queues() should avoid racing against it, otherwise
we could end up passing invalid values to blk_mq_update_nr_hw_queues().

WARNING: CPU: 39 PID: 61303 at drivers/pci/msi/api.c:347
pci_irq_get_affinity+0x187/0x210
Workqueue: nvme-reset-wq nvme_reset_work [nvme]
RIP: 0010:pci_irq_get_affinity+0x187/0x210
Call Trace:

? blk_mq_pci_map_queues+0x87/0x3c0
? pci_irq_get_affinity+0x187/0x210
blk_mq_pci_map_queues+0x87/0x3c0
nvme_pci_map_queues+0x189/0x460 [nvme]
blk_mq_update_nr_hw_queues+0x2a/0x40
nvme_reset_work+0x1be/0x2a0 [nvme]

Fix the bug by locking the shutdown_lock mutex before using
dev->online_queues. Give up if nvme_dev_disable() is running or if
it has been executed already.

Solution(s)

huawei-euleros-2_0_sp11-upgrade-bpftoolhuawei-euleros-2_0_sp11-upgrade-kernelhuawei-euleros-2_0_sp11-upgrade-kernel-abi-stablelistshuawei-euleros-2_0_sp11-upgrade-kernel-toolshuawei-euleros-2_0_sp11-upgrade-kernel-tools-libshuawei-euleros-2_0_sp11-upgrade-python3-perf
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.