跳转到帖子

Ubuntu: (Multiple Advisories) (CVE-2024-50093): Linux kernel vulnerabilities

recommended_posts

发布于
  • Members

Ubuntu: (Multiple Advisories) (CVE-2024-50093): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
11/05/2024
Created
12/19/2024
Added
12/18/2024
Modified
01/30/2025

Description

In the Linux kernel, the following vulnerability has been resolved: thermal: intel: int340x: processor: Fix warning during module unload The processor_thermal driver uses pcim_device_enable() to enable a PCI device, which means the device will be automatically disabled on driver detach.Thus there is no need to call pci_disable_device() again on it. With recent PCI device resource management improvements, e.g. commit f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is exposed and triggers the warining below. [224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device [224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100 ... [224.010844] Call Trace: [224.010845]<TASK> [224.010847]? show_regs+0x6d/0x80 [224.010851]? __warn+0x8c/0x140 [224.010854]? pci_disable_device+0xe5/0x100 [224.010856]? report_bug+0x1c9/0x1e0 [224.010859]? handle_bug+0x46/0x80 [224.010862]? exc_invalid_op+0x1d/0x80 [224.010863]? asm_exc_invalid_op+0x1f/0x30 [224.010867]? pci_disable_device+0xe5/0x100 [224.010869]? pci_disable_device+0xe5/0x100 [224.010871]? kfree+0x21a/0x2b0 [224.010873]pcim_disable_device+0x20/0x30 [224.010875]devm_action_release+0x16/0x20 [224.010878]release_nodes+0x47/0xc0 [224.010880]devres_release_all+0x9f/0xe0 [224.010883]device_unbind_cleanup+0x12/0x80 [224.010885]device_release_driver_internal+0x1ca/0x210 [224.010887]driver_detach+0x4e/0xa0 [224.010889]bus_remove_driver+0x6f/0xf0 [224.010890]driver_unregister+0x35/0x60 [224.010892]pci_unregister_driver+0x44/0x90 [224.010894]proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci] ... [224.010921] ---[ end trace 0000000000000000 ]--- Remove the excess pci_disable_device() calls. [ rjw: Subject and changelog edits ]

Solution(s)

  • ubuntu-upgrade-linux-image-5-15-0-1039-xilinx-zynqmp
  • ubuntu-upgrade-linux-image-5-15-0-1056-gkeop
  • ubuntu-upgrade-linux-image-5-15-0-1066-ibm
  • ubuntu-upgrade-linux-image-5-15-0-1066-raspi
  • ubuntu-upgrade-linux-image-5-15-0-1068-nvidia
  • ubuntu-upgrade-linux-image-5-15-0-1068-nvidia-lowlatency
  • ubuntu-upgrade-linux-image-5-15-0-1070-gke
  • ubuntu-upgrade-linux-image-5-15-0-1070-kvm
  • ubuntu-upgrade-linux-image-5-15-0-1071-intel-iotg
  • ubuntu-upgrade-linux-image-5-15-0-1071-oracle
  • ubuntu-upgrade-linux-image-5-15-0-1072-gcp
  • ubuntu-upgrade-linux-image-5-15-0-1073-aws
  • ubuntu-upgrade-linux-image-5-15-0-1078-azure
  • ubuntu-upgrade-linux-image-5-15-0-127-generic
  • ubuntu-upgrade-linux-image-5-15-0-127-generic-64k
  • ubuntu-upgrade-linux-image-5-15-0-127-generic-lpae
  • ubuntu-upgrade-linux-image-5-15-0-127-lowlatency
  • ubuntu-upgrade-linux-image-5-15-0-127-lowlatency-64k
  • ubuntu-upgrade-linux-image-aws
  • ubuntu-upgrade-linux-image-aws-lts-22-04
  • ubuntu-upgrade-linux-image-azure
  • ubuntu-upgrade-linux-image-azure-cvm
  • ubuntu-upgrade-linux-image-azure-lts-22-04
  • ubuntu-upgrade-linux-image-gcp
  • ubuntu-upgrade-linux-image-gcp-lts-22-04
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-64k
  • ubuntu-upgrade-linux-image-generic-64k-hwe-20-04
  • ubuntu-upgrade-linux-image-generic-hwe-20-04
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-gke-5-15
  • ubuntu-upgrade-linux-image-gkeop
  • ubuntu-upgrade-linux-image-gkeop-5-15
  • ubuntu-upgrade-linux-image-ibm
  • ubuntu-upgrade-linux-image-intel
  • ubuntu-upgrade-linux-image-intel-iotg
  • ubuntu-upgrade-linux-image-kvm
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-64k
  • ubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04
  • ubuntu-upgrade-linux-image-lowlatency-hwe-20-04
  • ubuntu-upgrade-linux-image-nvidia
  • ubuntu-upgrade-linux-image-nvidia-lowlatency
  • ubuntu-upgrade-linux-image-oem-20-04
  • ubuntu-upgrade-linux-image-oem-20-04b
  • ubuntu-upgrade-linux-image-oem-20-04c
  • ubuntu-upgrade-linux-image-oem-20-04d
  • ubuntu-upgrade-linux-image-oracle
  • ubuntu-upgrade-linux-image-oracle-lts-22-04
  • ubuntu-upgrade-linux-image-raspi
  • ubuntu-upgrade-linux-image-raspi-nolpae
  • ubuntu-upgrade-linux-image-virtual
  • ubuntu-upgrade-linux-image-virtual-hwe-20-04
  • ubuntu-upgrade-linux-image-xilinx-zynqmp

References

  • https://attackerkb.com/topics/cve-2024-50093
  • CVE - 2024-50093
  • USN-7166-1
  • USN-7166-2
  • USN-7166-3
  • USN-7166-4
  • USN-7186-1
  • USN-7186-2
  • USN-7194-1
View more
  • 查看数 694
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…