CVE-2024-47739 (GCVE-0-2024-47739)
Vulnerability from cvelistv5
Published
2024-10-21 12:14
Modified
2025-11-03 22:21
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: padata: use integer wrap around to prevent deadlock on seq_nr overflow When submitting more than 2^32 padata objects to padata_do_serial, the current sorting implementation incorrectly sorts padata objects with overflowed seq_nr, causing them to be placed before existing objects in the reorder list. This leads to a deadlock in the serialization process as padata_find_next cannot match padata->seq_nr and pd->processed because the padata instance with overflowed seq_nr will be selected next. To fix this, we use an unsigned integer wrap around to correctly sort padata objects in scenarios with integer overflow.
Impacted products
Vendor Product Version
Linux Linux Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Version: bfde23ce200e6d33291d29b9b8b60cc2f30f0805
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-47739",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-21T12:59:27.799629Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T13:04:14.713Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T22:21:35.468Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "kernel/padata.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "46c4079460f4dcaf445860679558eedef4e1bc91",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "72164d5b648951684b1a593996b37a6083c61d7d",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "ab205e1c3846326f162180e56825b4ba38ce9c30",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "1b8cf11b3ca593a8802a51802cd0c28c38501428",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "9e279e6c1f012b82628b89e1b9c65dbefa8ca25a",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "1bd712de96ad7167fe0d608e706cd60587579f16",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            },
            {
              "lessThan": "9a22b2812393d93d84358a760c347c21939029a6",
              "status": "affected",
              "version": "bfde23ce200e6d33291d29b9b8b60cc2f30f0805",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "kernel/padata.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.4"
            },
            {
              "lessThan": "5.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.227",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.168",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.113",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.54",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.12",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.227",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.168",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.113",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.54",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10.13",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.11.2",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: use integer wrap around to prevent deadlock on seq_nr overflow\n\nWhen submitting more than 2^32 padata objects to padata_do_serial, the\ncurrent sorting implementation incorrectly sorts padata objects with\noverflowed seq_nr, causing them to be placed before existing objects in\nthe reorder list. This leads to a deadlock in the serialization process\nas padata_find_next cannot match padata-\u003eseq_nr and pd-\u003eprocessed\nbecause the padata instance with overflowed seq_nr will be selected\nnext.\n\nTo fix this, we use an unsigned integer wrap around to correctly sort\npadata objects in scenarios with integer overflow."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T09:38:43.928Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/46c4079460f4dcaf445860679558eedef4e1bc91"
        },
        {
          "url": "https://git.kernel.org/stable/c/72164d5b648951684b1a593996b37a6083c61d7d"
        },
        {
          "url": "https://git.kernel.org/stable/c/ab205e1c3846326f162180e56825b4ba38ce9c30"
        },
        {
          "url": "https://git.kernel.org/stable/c/1b8cf11b3ca593a8802a51802cd0c28c38501428"
        },
        {
          "url": "https://git.kernel.org/stable/c/9e279e6c1f012b82628b89e1b9c65dbefa8ca25a"
        },
        {
          "url": "https://git.kernel.org/stable/c/1bd712de96ad7167fe0d608e706cd60587579f16"
        },
        {
          "url": "https://git.kernel.org/stable/c/9a22b2812393d93d84358a760c347c21939029a6"
        }
      ],
      "title": "padata: use integer wrap around to prevent deadlock on seq_nr overflow",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-47739",
    "datePublished": "2024-10-21T12:14:08.495Z",
    "dateReserved": "2024-09-30T16:00:12.959Z",
    "dateUpdated": "2025-11-03T22:21:35.468Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T22:21:35.468Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47739\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-21T12:59:27.799629Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-21T12:59:30.940Z\"}}], \"cna\": {\"title\": \"padata: use integer wrap around to prevent deadlock on seq_nr overflow\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"46c4079460f4dcaf445860679558eedef4e1bc91\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"72164d5b648951684b1a593996b37a6083c61d7d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"ab205e1c3846326f162180e56825b4ba38ce9c30\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"1b8cf11b3ca593a8802a51802cd0c28c38501428\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"9e279e6c1f012b82628b89e1b9c65dbefa8ca25a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"1bd712de96ad7167fe0d608e706cd60587579f16\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bfde23ce200e6d33291d29b9b8b60cc2f30f0805\", \"lessThan\": \"9a22b2812393d93d84358a760c347c21939029a6\", \"versionType\": \"git\"}], \"programFiles\": [\"kernel/padata.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.4\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.4\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.227\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.54\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.13\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"kernel/padata.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/46c4079460f4dcaf445860679558eedef4e1bc91\"}, {\"url\": \"https://git.kernel.org/stable/c/72164d5b648951684b1a593996b37a6083c61d7d\"}, {\"url\": \"https://git.kernel.org/stable/c/ab205e1c3846326f162180e56825b4ba38ce9c30\"}, {\"url\": \"https://git.kernel.org/stable/c/1b8cf11b3ca593a8802a51802cd0c28c38501428\"}, {\"url\": \"https://git.kernel.org/stable/c/9e279e6c1f012b82628b89e1b9c65dbefa8ca25a\"}, {\"url\": \"https://git.kernel.org/stable/c/1bd712de96ad7167fe0d608e706cd60587579f16\"}, {\"url\": \"https://git.kernel.org/stable/c/9a22b2812393d93d84358a760c347c21939029a6\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\npadata: use integer wrap around to prevent deadlock on seq_nr overflow\\n\\nWhen submitting more than 2^32 padata objects to padata_do_serial, the\\ncurrent sorting implementation incorrectly sorts padata objects with\\noverflowed seq_nr, causing them to be placed before existing objects in\\nthe reorder list. This leads to a deadlock in the serialization process\\nas padata_find_next cannot match padata-\u003eseq_nr and pd-\u003eprocessed\\nbecause the padata instance with overflowed seq_nr will be selected\\nnext.\\n\\nTo fix this, we use an unsigned integer wrap around to correctly sort\\npadata objects in scenarios with integer overflow.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.227\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.168\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.113\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.54\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10.13\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11.2\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.12\", \"versionStartIncluding\": \"5.4\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:38:43.928Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-47739\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T22:21:35.468Z\", \"dateReserved\": \"2024-09-30T16:00:12.959Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T12:14:08.495Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…