U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-57807 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: megaraid_sas: Fix for a potential deadlock This fixes a 'possible circular locking dependency detected' warning CPU0 CPU1 ---- ---- lock(&instance->reset_mutex); lock(&shost->scan_mutex); lock(&instance->reset_mutex); lock(&shost->scan_mutex); Fix this by temporarily releasing the reset_mutex.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/3c654998a3e8167a58b6c6fede545fe400a4b554 Patch 
https://git.kernel.org/stable/c/466ca39dbf5d0ba71c16b15c27478a9c7d4022a8 Patch 
https://git.kernel.org/stable/c/50740f4dc78b41dec7c8e39772619d5ba841ddd7 Patch 
https://git.kernel.org/stable/c/78afb9bfad00c4aa58a424111d7edbcab9452f2b Patch 
https://git.kernel.org/stable/c/edadc693bfcc0f1ea08b8fa041c9361fd042410d Patch 
https://git.kernel.org/stable/c/f36d024bd15ed356a80dda3ddc46d0a62aa55815 Patch 
https://git.kernel.org/stable/c/f50783148ec98a1d38b87422e2ceaf2380b7b606 Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-667 Improper Locking cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-57807
NVD Published Date:
01/11/2025
NVD Last Modified:
01/16/2025
Source:
kernel.org