We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)
Ok

THREATINT
PUBLISHED

CVE-2024-27006

thermal/debugfs: Add missing count increment to thermal_debug_tz_trip_up()

Reserved:2024-02-19
Published:2024-05-01
Updated:2024-05-13

Description

In the Linux kernel, the following vulnerability has been resolved: thermal/debugfs: Add missing count increment to thermal_debug_tz_trip_up() The count field in struct trip_stats, representing the number of times the zone temperature was above the trip point, needs to be incremented in thermal_debug_tz_trip_up(), for two reasons. First, if a trip point is crossed on the way up for the first time, thermal_debug_update_temp() called from update_temperature() does not see it because it has not been added to trips_crossed[] array in the thermal zone's struct tz_debugfs object yet. Therefore, when thermal_debug_tz_trip_up() is called after that, the trip point's count value is 0, and the attempt to divide by it during the average temperature computation leads to a divide error which causes the kernel to crash. Setting the count to 1 before the division by incrementing it fixes this problem. Second, if a trip point is crossed on the way up, but it has been crossed on the way up already before, its count value needs to be incremented to make a record of the fact that the zone temperature is above the trip now. Without doing that, if the mitigations applied after crossing the trip cause the zone temperature to drop below its threshold, the count will not be updated for this episode at all and the average temperature in the trip statistics record will be somewhat higher than it should be. Cc :6.8+ <stable@vger.kernel.org> # 6.8+

Product status

Default status
unaffected

7ef01f228c9f before 9c8215d32e73
affected

7ef01f228c9f before b552f63cd437
affected

Default status
affected

6.8
affected

Any version before 6.8
unaffected

6.8.8
unaffected

6.9
unaffected

References

https://git.kernel.org/stable/c/9c8215d32e730b597c809a9d2090bf8ec1b79fcf

https://git.kernel.org/stable/c/b552f63cd43735048bbe9bfbb7a9dcfce166fbdd

cve.org CVE-2024-27006

nvd.nist.gov CVE-2024-27006

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-27006