#VU99027 Improper locking in Linux kernel - CVE-2024-47744
Published: October 22, 2024 / Updated: May 12, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the EXPORT_SYMBOL_GPL(), kvm_online_cpu(), hardware_disable_nolock(), hardware_disable_all_nolock(), hardware_enable_all() and kvm_suspend() functions in virt/kvm/kvm_main.c, within the cpus_read_lock() function in Documentation/virt/kvm/locking.rst. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/4777225ec89f52bb9ca16a33cfb44c189f1b7b47
- https://git.kernel.org/stable/c/a2764afce521fd9fd7a5ff6ed52ac2095873128a
- https://git.kernel.org/stable/c/760a196e6dcb29580e468b44b5400171dae184d8
- https://git.kernel.org/stable/c/44d17459626052a2390457e550a12cb973506b2f
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11.2
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.54