We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56714

ionic: no double destroy workqueue



Description

In the Linux kernel, the following vulnerability has been resolved: ionic: no double destroy workqueue There are some FW error handling paths that can cause us to try to destroy the workqueue more than once, so let's be sure we're checking for that. The case where this popped up was in an AER event where the handlers got called in such a way that ionic_reset_prepare() and thus ionic_dev_teardown() got called twice in a row. The second time through the workqueue was already destroyed, and destroy_workqueue() choked on the bad wq pointer. We didn't hit this in AER handler testing before because at that time we weren't using a private workqueue. Later we replaced the use of the system workqueue with our own private workqueue but hadn't rerun the AER handler testing since then.

Reserved 2024-12-27 | Published 2024-12-29 | Updated 2025-01-20 | Assigner Linux

Product status

Default status
unaffected

9e25450da7006cd6f425248a5b38dad4adb3c981 before 13355dd37e22edbcb99c599f783233188740a650
affected

9e25450da7006cd6f425248a5b38dad4adb3c981 before 746e6ae2e202b062b9deee7bd86d94937997ecd7
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

6.12.7
unaffected

6.13
unaffected

References

git.kernel.org/...c/13355dd37e22edbcb99c599f783233188740a650

git.kernel.org/...c/746e6ae2e202b062b9deee7bd86d94937997ecd7

cve.org (CVE-2024-56714)

nvd.nist.gov (CVE-2024-56714)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56714

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.