We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50019

kthread: unpark only parked kthread



Description

In the Linux kernel, the following vulnerability has been resolved: kthread: unpark only parked kthread Calling into kthread unparking unconditionally is mostly harmless when the kthread is already unparked. The wake up is then simply ignored because the target is not in TASK_PARKED state. However if the kthread is per CPU, the wake up is preceded by a call to kthread_bind() which expects the task to be inactive and in TASK_PARKED state, which obviously isn't the case if it is unparked. As a result, calling kthread_stop() on an unparked per-cpu kthread triggers such a warning: WARNING: CPU: 0 PID: 11 at kernel/kthread.c:525 __kthread_bind_mask kernel/kthread.c:525 <TASK> kthread_stop+0x17a/0x630 kernel/kthread.c:707 destroy_workqueue+0x136/0xc40 kernel/workqueue.c:5810 wg_destruct+0x1e2/0x2e0 drivers/net/wireguard/device.c:257 netdev_run_todo+0xe1a/0x1000 net/core/dev.c:10693 default_device_exit_batch+0xa14/0xa90 net/core/dev.c:11769 ops_exit_list net/core/net_namespace.c:178 [inline] cleanup_net+0x89d/0xcc0 net/core/net_namespace.c:640 process_one_work kernel/workqueue.c:3231 [inline] process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312 worker_thread+0x86d/0xd70 kernel/workqueue.c:3393 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 </TASK> Fix this with skipping unecessary unparking while stopping a kthread.

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

5c25b5ff89f004c30b04759dc34ace8585a4085f before 40a6e660d2a3a7a5cb99f0b8ff4fb41bad039f68
affected

5c25b5ff89f004c30b04759dc34ace8585a4085f before 8608196a155cb6cfae04d96b10a2652d0327e33f
affected

5c25b5ff89f004c30b04759dc34ace8585a4085f before 19a5029981c87c2ad0845e713837faa88f5d8e2b
affected

5c25b5ff89f004c30b04759dc34ace8585a4085f before cda5423c1a1c906062ef235c940f249b97d9d135
affected

5c25b5ff89f004c30b04759dc34ace8585a4085f before 214e01ad4ed7158cab66498810094fac5d09b218
affected

Default status
affected

5.11
affected

Any version before 5.11
unaffected

5.15.168
unaffected

6.1.113
unaffected

6.6.57
unaffected

6.11.4
unaffected

6.12
unaffected

References

git.kernel.org/...c/40a6e660d2a3a7a5cb99f0b8ff4fb41bad039f68

git.kernel.org/...c/8608196a155cb6cfae04d96b10a2652d0327e33f

git.kernel.org/...c/19a5029981c87c2ad0845e713837faa88f5d8e2b

git.kernel.org/...c/cda5423c1a1c906062ef235c940f249b97d9d135

git.kernel.org/...c/214e01ad4ed7158cab66498810094fac5d09b218

cve.org (CVE-2024-50019)

nvd.nist.gov (CVE-2024-50019)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50019

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.