{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-56701","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-12-27T15:00:39.856Z","datePublished":"2024-12-28T09:46:23.516Z","dateUpdated":"2025-11-03T20:52:50.956Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T10:02:49.180Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Fix dtl_access_lock to be a rw_semaphore\n\nThe dtl_access_lock needs to be a rw_sempahore, a sleeping lock, because\nthe code calls kmalloc() while holding it, which can sleep:\n\n  # echo 1 > /proc/powerpc/vcpudispatch_stats\n  BUG: sleeping function called from invalid context at include/linux/sched/mm.h:337\n  in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 199, name: sh\n  preempt_count: 1, expected: 0\n  3 locks held by sh/199:\n   #0: c00000000a0743f8 (sb_writers#3){.+.+}-{0:0}, at: vfs_write+0x324/0x438\n   #1: c0000000028c7058 (dtl_enable_mutex){+.+.}-{3:3}, at: vcpudispatch_stats_write+0xd4/0x5f4\n   #2: c0000000028c70b8 (dtl_access_lock){+.+.}-{2:2}, at: vcpudispatch_stats_write+0x220/0x5f4\n  CPU: 0 PID: 199 Comm: sh Not tainted 6.10.0-rc4 #152\n  Hardware name: IBM pSeries (emulated by qemu) POWER9 (raw) 0x4e1202 0xf000005 of:SLOF,HEAD hv:linux,kvm pSeries\n  Call Trace:\n    dump_stack_lvl+0x130/0x148 (unreliable)\n    __might_resched+0x174/0x410\n    kmem_cache_alloc_noprof+0x340/0x3d0\n    alloc_dtl_buffers+0x124/0x1ac\n    vcpudispatch_stats_write+0x2a8/0x5f4\n    proc_reg_write+0xf4/0x150\n    vfs_write+0xfc/0x438\n    ksys_write+0x88/0x148\n    system_call_exception+0x1c4/0x5a0\n    system_call_common+0xf4/0x258"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/powerpc/include/asm/dtl.h","arch/powerpc/platforms/pseries/dtl.c","arch/powerpc/platforms/pseries/lpar.c"],"versions":[{"version":"06220d78f24a20549757be1014e57c382406cc92","lessThan":"6956c0e7346ce1bbfc726755aa8da10d26e84276","status":"affected","versionType":"git"},{"version":"06220d78f24a20549757be1014e57c382406cc92","lessThan":"f6ec133668757f84e5143f1eb141fd0b83778b9e","status":"affected","versionType":"git"},{"version":"06220d78f24a20549757be1014e57c382406cc92","lessThan":"fa5b5ea257135e771b489c83a2e93b5935d0108e","status":"affected","versionType":"git"},{"version":"06220d78f24a20549757be1014e57c382406cc92","lessThan":"a246daa26b717e755ccc9061f47f7cd1c0b358dd","status":"affected","versionType":"git"},{"version":"06220d78f24a20549757be1014e57c382406cc92","lessThan":"b125d0cf1adde7b2b47d7337fed7e9133eea3463","status":"affected","versionType":"git"},{"version":"06220d78f24a20549757be1014e57c382406cc92","lessThan":"525e18f1ba7c2b098c8ba587fb397efb34a6574c","status":"affected","versionType":"git"},{"version":"06220d78f24a20549757be1014e57c382406cc92","lessThan":"cadae3a45d23aa4f6485938a67cbc47aaaa25e38","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/powerpc/include/asm/dtl.h","arch/powerpc/platforms/pseries/dtl.c","arch/powerpc/platforms/pseries/lpar.c"],"versions":[{"version":"5.3","status":"affected"},{"version":"0","lessThan":"5.3","status":"unaffected","versionType":"semver"},{"version":"5.10.231","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.174","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.120","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.64","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.11.11","lessThanOrEqual":"6.11.*","status":"unaffected","versionType":"semver"},{"version":"6.12.2","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"5.10.231"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"5.15.174"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"6.1.120"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"6.6.64"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"6.11.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"6.12.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"6.13"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/6956c0e7346ce1bbfc726755aa8da10d26e84276"},{"url":"https://git.kernel.org/stable/c/f6ec133668757f84e5143f1eb141fd0b83778b9e"},{"url":"https://git.kernel.org/stable/c/fa5b5ea257135e771b489c83a2e93b5935d0108e"},{"url":"https://git.kernel.org/stable/c/a246daa26b717e755ccc9061f47f7cd1c0b358dd"},{"url":"https://git.kernel.org/stable/c/b125d0cf1adde7b2b47d7337fed7e9133eea3463"},{"url":"https://git.kernel.org/stable/c/525e18f1ba7c2b098c8ba587fb397efb34a6574c"},{"url":"https://git.kernel.org/stable/c/cadae3a45d23aa4f6485938a67cbc47aaaa25e38"}],"title":"powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:52:50.956Z"}}]}}