CVE-2024-57946 (GCVE-0-2024-57946)

Vulnerability from cvelistv5 – Published: 2025-01-21 12:22 – Updated: 2025-11-03 20:56
VLAI?
Summary
In the Linux kernel, the following vulnerability has been resolved: virtio-blk: don't keep queue frozen during system suspend Commit 4ce6e2db00de ("virtio-blk: Ensure no requests in virtqueues before deleting vqs.") replaces queue quiesce with queue freeze in virtio-blk's PM callbacks. And the motivation is to drain inflight IOs before suspending. block layer's queue freeze looks very handy, but it is also easy to cause deadlock, such as, any attempt to call into bio_queue_enter() may run into deadlock if the queue is frozen in current context. There are all kinds of ->suspend() called in suspend context, so keeping queue frozen in the whole suspend context isn't one good idea. And Marek reported lockdep warning[1] caused by virtio-blk's freeze queue in virtblk_freeze(). [1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/ Given the motivation is to drain in-flight IOs, it can be done by calling freeze & unfreeze, meantime restore to previous behavior by keeping queue quiesced during suspend.
CWE
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: b7bfaea8f5ecd290864f5ae4c69859b89832b4dc , < d738f3215bb4f88911ff4579780a44960c8e0ca5 (git)
Affected: 5fe446b245ba61ddc924d7db280bcd987c39357a , < 9ca428c6397abaa8c38f5c69133a2299e1efbbf2 (git)
Affected: 2a52590ac52394540351d8289cc2af0b83cf7d31 , < 6dea8e3de59928974bf157dd0499d3958d744ae4 (git)
Affected: db48acce75d73dfe51c43d56893cce067b73cf08 , < 9e323f856cf4963120e0e3892a84ef8bd764a0e4 (git)
Affected: 8946924ff324853df6b7c525a7467d964dfd11c3 , < 12c0ddd6c551c1e438b087f874b4f1223a75f7ea (git)
Affected: 4ce6e2db00de8103a0687fb0f65fd17124a51aaa , < 92d5139b91147ab372a17daf5dc27a5b9278e516 (git)
Affected: 4ce6e2db00de8103a0687fb0f65fd17124a51aaa , < 7678abee0867e6b7fb89aa40f6e9f575f755fb37 (git)
Affected: 2b5128c714d863cd8d259aa9d87bed2d6aa6a5a8 (git)
Affected: c67ed40b1b4a66e3a13b21bdfbd0151639da5240 (git)
Create a notification for this product.
    Linux Linux Affected: 6.8
Unaffected: 0 , < 6.8 (semver)
Unaffected: 5.4.289 , ≤ 5.4.* (semver)
Unaffected: 5.10.233 , ≤ 5.10.* (semver)
Unaffected: 5.15.176 , ≤ 5.15.* (semver)
Unaffected: 6.1.123 , ≤ 6.1.* (semver)
Unaffected: 6.6.69 , ≤ 6.6.* (semver)
Unaffected: 6.12.8 , ≤ 6.12.* (semver)
Unaffected: 6.13 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-57946",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-01T19:52:30.682704Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-667",
                "description": "CWE-667 Improper Locking",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-01T19:57:13.037Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T20:56:12.738Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/block/virtio_blk.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "d738f3215bb4f88911ff4579780a44960c8e0ca5",
              "status": "affected",
              "version": "b7bfaea8f5ecd290864f5ae4c69859b89832b4dc",
              "versionType": "git"
            },
            {
              "lessThan": "9ca428c6397abaa8c38f5c69133a2299e1efbbf2",
              "status": "affected",
              "version": "5fe446b245ba61ddc924d7db280bcd987c39357a",
              "versionType": "git"
            },
            {
              "lessThan": "6dea8e3de59928974bf157dd0499d3958d744ae4",
              "status": "affected",
              "version": "2a52590ac52394540351d8289cc2af0b83cf7d31",
              "versionType": "git"
            },
            {
              "lessThan": "9e323f856cf4963120e0e3892a84ef8bd764a0e4",
              "status": "affected",
              "version": "db48acce75d73dfe51c43d56893cce067b73cf08",
              "versionType": "git"
            },
            {
              "lessThan": "12c0ddd6c551c1e438b087f874b4f1223a75f7ea",
              "status": "affected",
              "version": "8946924ff324853df6b7c525a7467d964dfd11c3",
              "versionType": "git"
            },
            {
              "lessThan": "92d5139b91147ab372a17daf5dc27a5b9278e516",
              "status": "affected",
              "version": "4ce6e2db00de8103a0687fb0f65fd17124a51aaa",
              "versionType": "git"
            },
            {
              "lessThan": "7678abee0867e6b7fb89aa40f6e9f575f755fb37",
              "status": "affected",
              "version": "4ce6e2db00de8103a0687fb0f65fd17124a51aaa",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "2b5128c714d863cd8d259aa9d87bed2d6aa6a5a8",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "c67ed40b1b4a66e3a13b21bdfbd0151639da5240",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/block/virtio_blk.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.8"
            },
            {
              "lessThan": "6.8",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.289",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.233",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.176",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.123",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.69",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.289",
                  "versionStartIncluding": "5.4.270",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.233",
                  "versionStartIncluding": "5.10.211",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.176",
                  "versionStartIncluding": "5.15.150",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.123",
                  "versionStartIncluding": "6.1.80",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.69",
                  "versionStartIncluding": "6.6.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.8",
                  "versionStartIncluding": "6.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.13",
                  "versionStartIncluding": "6.8",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.19.308",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.7.7",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: don\u0027t keep queue frozen during system suspend\n\nCommit 4ce6e2db00de (\"virtio-blk: Ensure no requests in virtqueues before\ndeleting vqs.\") replaces queue quiesce with queue freeze in virtio-blk\u0027s\nPM callbacks. And the motivation is to drain inflight IOs before suspending.\n\nblock layer\u0027s queue freeze looks very handy, but it is also easy to cause\ndeadlock, such as, any attempt to call into bio_queue_enter() may run into\ndeadlock if the queue is frozen in current context. There are all kinds\nof -\u003esuspend() called in suspend context, so keeping queue frozen in the\nwhole suspend context isn\u0027t one good idea. And Marek reported lockdep\nwarning[1] caused by virtio-blk\u0027s freeze queue in virtblk_freeze().\n\n[1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/\n\nGiven the motivation is to drain in-flight IOs, it can be done by calling\nfreeze \u0026 unfreeze, meantime restore to previous behavior by keeping queue\nquiesced during suspend."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-03T12:59:22.528Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/d738f3215bb4f88911ff4579780a44960c8e0ca5"
        },
        {
          "url": "https://git.kernel.org/stable/c/9ca428c6397abaa8c38f5c69133a2299e1efbbf2"
        },
        {
          "url": "https://git.kernel.org/stable/c/6dea8e3de59928974bf157dd0499d3958d744ae4"
        },
        {
          "url": "https://git.kernel.org/stable/c/9e323f856cf4963120e0e3892a84ef8bd764a0e4"
        },
        {
          "url": "https://git.kernel.org/stable/c/12c0ddd6c551c1e438b087f874b4f1223a75f7ea"
        },
        {
          "url": "https://git.kernel.org/stable/c/92d5139b91147ab372a17daf5dc27a5b9278e516"
        },
        {
          "url": "https://git.kernel.org/stable/c/7678abee0867e6b7fb89aa40f6e9f575f755fb37"
        }
      ],
      "title": "virtio-blk: don\u0027t keep queue frozen during system suspend",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-57946",
    "datePublished": "2025-01-21T12:22:53.324Z",
    "dateReserved": "2025-01-19T11:50:08.380Z",
    "dateUpdated": "2025-11-03T20:56:12.738Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-57946\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-01-21T13:15:09.137\",\"lastModified\":\"2025-11-03T21:18:46.227\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvirtio-blk: don\u0027t keep queue frozen during system suspend\\n\\nCommit 4ce6e2db00de (\\\"virtio-blk: Ensure no requests in virtqueues before\\ndeleting vqs.\\\") replaces queue quiesce with queue freeze in virtio-blk\u0027s\\nPM callbacks. And the motivation is to drain inflight IOs before suspending.\\n\\nblock layer\u0027s queue freeze looks very handy, but it is also easy to cause\\ndeadlock, such as, any attempt to call into bio_queue_enter() may run into\\ndeadlock if the queue is frozen in current context. There are all kinds\\nof -\u003esuspend() called in suspend context, so keeping queue frozen in the\\nwhole suspend context isn\u0027t one good idea. And Marek reported lockdep\\nwarning[1] caused by virtio-blk\u0027s freeze queue in virtblk_freeze().\\n\\n[1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/\\n\\nGiven the motivation is to drain in-flight IOs, it can be done by calling\\nfreeze \u0026 unfreeze, meantime restore to previous behavior by keeping queue\\nquiesced during suspend.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtio-blk: no mantener la cola congelada durante la suspensi\u00f3n del sistema. Commit 4ce6e2db00de (\\\"virtio-blk: Aseg\u00farese de que no haya solicitudes en virtqueues antes de eliminar vqs\\\") reemplaza la inactividad de la cola con el congelamiento de la cola en las devoluciones de llamadas de PM de virtio-blk. Y la motivaci\u00f3n es drenar las E/S en vuelo antes de suspender. El congelamiento de la cola de la capa de bloque parece muy \u00fatil, pero tambi\u00e9n es f\u00e1cil causar un bloqueo, como, por ejemplo, cualquier intento de llamar a bio_queue_enter() puede encontrarse con un bloqueo si la cola est\u00e1 congelada en el contexto actual. Hay todo tipo de -\u0026gt;suspend() llamados en el contexto de suspensi\u00f3n, por lo que mantener la cola congelada en todo el contexto de suspensi\u00f3n no es una buena idea. Y Marek inform\u00f3 una advertencia de lockdep[1] causada por la cola congelada de virtio-blk en virtblk_freeze(). [1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/ Dado que la motivaci\u00f3n es drenar las E/S en vuelo, se puede hacer llamando a congelar y descongelar, mientras tanto restaurar el comportamiento anterior manteniendo la cola inactiva durante la suspensi\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.4.289\",\"matchCriteriaId\":\"EA819787-BFBA-4C7B-80F4-E74FF26CFE9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.233\",\"matchCriteriaId\":\"44569A17-FE4C-4BE3-9C0C-74AC54C7B51B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.176\",\"matchCriteriaId\":\"DDBD8FC6-2357-4347-BFA1-B4A4A3039F35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.123\",\"matchCriteriaId\":\"C6F5378E-B1C8-402E-A256-91DD0F6C30C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.69\",\"matchCriteriaId\":\"EF18E3CB-058C-4836-B36D-8073F1C09977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.12.8\",\"matchCriteriaId\":\"E79883DD-75BE-4DA9-B4EC-AC6DE63BD438\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62567B3C-6CEE-46D0-BC2E-B3717FBF7D13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A073481-106D-4B15-B4C7-FB0213B8E1D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE491969-75AE-4A6B-9A58-8FC5AF98798F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C0660D-7FB8-4FBA-892A-B064BA71E49E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"034C36A6-C481-41F3-AE9A-D116E5BE6895\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/12c0ddd6c551c1e438b087f874b4f1223a75f7ea\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6dea8e3de59928974bf157dd0499d3958d744ae4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7678abee0867e6b7fb89aa40f6e9f575f755fb37\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/92d5139b91147ab372a17daf5dc27a5b9278e516\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9ca428c6397abaa8c38f5c69133a2299e1efbbf2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9e323f856cf4963120e0e3892a84ef8bd764a0e4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d738f3215bb4f88911ff4579780a44960c8e0ca5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T20:56:12.738Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-57946\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-01T19:52:30.682704Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-667\", \"description\": \"CWE-667 Improper Locking\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-01T15:57:56.302Z\"}}], \"cna\": {\"title\": \"virtio-blk: don\u0027t keep queue frozen during system suspend\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"b7bfaea8f5ecd290864f5ae4c69859b89832b4dc\", \"lessThan\": \"d738f3215bb4f88911ff4579780a44960c8e0ca5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"5fe446b245ba61ddc924d7db280bcd987c39357a\", \"lessThan\": \"9ca428c6397abaa8c38f5c69133a2299e1efbbf2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2a52590ac52394540351d8289cc2af0b83cf7d31\", \"lessThan\": \"6dea8e3de59928974bf157dd0499d3958d744ae4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"db48acce75d73dfe51c43d56893cce067b73cf08\", \"lessThan\": \"9e323f856cf4963120e0e3892a84ef8bd764a0e4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"8946924ff324853df6b7c525a7467d964dfd11c3\", \"lessThan\": \"12c0ddd6c551c1e438b087f874b4f1223a75f7ea\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4ce6e2db00de8103a0687fb0f65fd17124a51aaa\", \"lessThan\": \"92d5139b91147ab372a17daf5dc27a5b9278e516\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4ce6e2db00de8103a0687fb0f65fd17124a51aaa\", \"lessThan\": \"7678abee0867e6b7fb89aa40f6e9f575f755fb37\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2b5128c714d863cd8d259aa9d87bed2d6aa6a5a8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c67ed40b1b4a66e3a13b21bdfbd0151639da5240\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/block/virtio_blk.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.8\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.8\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.4.289\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.233\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.176\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.123\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.69\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.12.*\"}, {\"status\": \"unaffected\", \"version\": \"6.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/block/virtio_blk.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/d738f3215bb4f88911ff4579780a44960c8e0ca5\"}, {\"url\": \"https://git.kernel.org/stable/c/9ca428c6397abaa8c38f5c69133a2299e1efbbf2\"}, {\"url\": \"https://git.kernel.org/stable/c/6dea8e3de59928974bf157dd0499d3958d744ae4\"}, {\"url\": \"https://git.kernel.org/stable/c/9e323f856cf4963120e0e3892a84ef8bd764a0e4\"}, {\"url\": \"https://git.kernel.org/stable/c/12c0ddd6c551c1e438b087f874b4f1223a75f7ea\"}, {\"url\": \"https://git.kernel.org/stable/c/92d5139b91147ab372a17daf5dc27a5b9278e516\"}, {\"url\": \"https://git.kernel.org/stable/c/7678abee0867e6b7fb89aa40f6e9f575f755fb37\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvirtio-blk: don\u0027t keep queue frozen during system suspend\\n\\nCommit 4ce6e2db00de (\\\"virtio-blk: Ensure no requests in virtqueues before\\ndeleting vqs.\\\") replaces queue quiesce with queue freeze in virtio-blk\u0027s\\nPM callbacks. And the motivation is to drain inflight IOs before suspending.\\n\\nblock layer\u0027s queue freeze looks very handy, but it is also easy to cause\\ndeadlock, such as, any attempt to call into bio_queue_enter() may run into\\ndeadlock if the queue is frozen in current context. There are all kinds\\nof -\u003esuspend() called in suspend context, so keeping queue frozen in the\\nwhole suspend context isn\u0027t one good idea. And Marek reported lockdep\\nwarning[1] caused by virtio-blk\u0027s freeze queue in virtblk_freeze().\\n\\n[1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/\\n\\nGiven the motivation is to drain in-flight IOs, it can be done by calling\\nfreeze \u0026 unfreeze, meantime restore to previous behavior by keeping queue\\nquiesced during suspend.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.289\", \"versionStartIncluding\": \"5.4.270\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.233\", \"versionStartIncluding\": \"5.10.211\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.176\", \"versionStartIncluding\": \"5.15.150\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.123\", \"versionStartIncluding\": \"6.1.80\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.69\", \"versionStartIncluding\": \"6.6.19\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.12.8\", \"versionStartIncluding\": \"6.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.13\", \"versionStartIncluding\": \"6.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.19.308\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"6.7.7\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-09-03T12:59:22.528Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-57946\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T20:56:12.738Z\", \"dateReserved\": \"2025-01-19T11:50:08.380Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2025-01-21T12:22:53.324Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…