Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-57939
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-21 Jan, 2025 | 12:18
Updated At-03 Nov, 2025 | 20:56
Rejected At-
▼CVE Numbering Authority (CNA)
riscv: Fix sleeping in invalid context in die()

In the Linux kernel, the following vulnerability has been resolved: riscv: Fix sleeping in invalid context in die() die() can be called in exception handler, and therefore cannot sleep. However, die() takes spinlock_t which can sleep with PREEMPT_RT enabled. That causes the following warning: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 285, name: mutex preempt_count: 110001, expected: 0 RCU nest depth: 0, expected: 0 CPU: 0 UID: 0 PID: 285 Comm: mutex Not tainted 6.12.0-rc7-00022-ge19049cf7d56-dirty #234 Hardware name: riscv-virtio,qemu (DT) Call Trace: dump_backtrace+0x1c/0x24 show_stack+0x2c/0x38 dump_stack_lvl+0x5a/0x72 dump_stack+0x14/0x1c __might_resched+0x130/0x13a rt_spin_lock+0x2a/0x5c die+0x24/0x112 do_trap_insn_illegal+0xa0/0xea _new_vmalloc_restore_context_a0+0xcc/0xd8 Oops - illegal instruction [#1] Switch to use raw_spinlock_t, which does not sleep even with PREEMPT_RT enabled.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/riscv/kernel/traps.c
Default Status
unaffected
Versions
Affected
  • From 76d2a0493a17d4c8ecc781366850c3c4f8e1a446 before 8c38baa03ac8e18140faf36a3b955d30cad48e74 (git)
  • From 76d2a0493a17d4c8ecc781366850c3c4f8e1a446 before 10c24df2e303f517fab0359392c11b6b1d553f2b (git)
  • From 76d2a0493a17d4c8ecc781366850c3c4f8e1a446 before c21df31fc2a4afc02a6e56511364e9e793ea92ec (git)
  • From 76d2a0493a17d4c8ecc781366850c3c4f8e1a446 before f48f060a4b36b5e96628f6c3fb1540f1e8dedb69 (git)
  • From 76d2a0493a17d4c8ecc781366850c3c4f8e1a446 before 76ab0afcdbe8c9685b589016ee1c0e25fe596707 (git)
  • From 76d2a0493a17d4c8ecc781366850c3c4f8e1a446 before 6a97f4118ac07cfdc316433f385dbdc12af5025e (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/riscv/kernel/traps.c
Default Status
affected
Versions
Affected
  • 4.15
Unaffected
  • From 0 before 4.15 (semver)
  • From 5.10.234 through 5.10.* (semver)
  • From 5.15.177 through 5.15.* (semver)
  • From 6.1.125 through 6.1.* (semver)
  • From 6.6.72 through 6.6.* (semver)
  • From 6.12.10 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/8c38baa03ac8e18140faf36a3b955d30cad48e74
N/A
https://git.kernel.org/stable/c/10c24df2e303f517fab0359392c11b6b1d553f2b
N/A
https://git.kernel.org/stable/c/c21df31fc2a4afc02a6e56511364e9e793ea92ec
N/A
https://git.kernel.org/stable/c/f48f060a4b36b5e96628f6c3fb1540f1e8dedb69
N/A
https://git.kernel.org/stable/c/76ab0afcdbe8c9685b589016ee1c0e25fe596707
N/A
https://git.kernel.org/stable/c/6a97f4118ac07cfdc316433f385dbdc12af5025e
N/A
Hyperlink: https://git.kernel.org/stable/c/8c38baa03ac8e18140faf36a3b955d30cad48e74
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/10c24df2e303f517fab0359392c11b6b1d553f2b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c21df31fc2a4afc02a6e56511364e9e793ea92ec
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f48f060a4b36b5e96628f6c3fb1540f1e8dedb69
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/76ab0afcdbe8c9685b589016ee1c0e25fe596707
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6a97f4118ac07cfdc316433f385dbdc12af5025e
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-noinfoCWE-noinfo Not enough information
Type: CWE
CWE ID: CWE-noinfo
Description: CWE-noinfo Not enough information
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
Resource: N/A
Details not found