{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T10:53:01.148","vulnerabilities":[{"cve":{"id":"CVE-2024-42300","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-08-17T09:15:10.360","lastModified":"2025-09-29T15:07:47.377","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: fix race in z_erofs_get_gbuf()\n\nIn z_erofs_get_gbuf(), the current task may be migrated to another\nCPU between `z_erofs_gbuf_id()` and `spin_lock(&gbuf->lock)`.\n\nTherefore, z_erofs_put_gbuf() will trigger the following issue\nwhich was found by stress test:\n\n<2>[772156.434168] kernel BUG at fs/erofs/zutil.c:58!\n..\n<4>[772156.435007]\n<4>[772156.439237] CPU: 0 PID: 3078 Comm: stress Kdump: loaded Tainted: G            E      6.10.0-rc7+ #2\n<4>[772156.439239] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 1.0.0 01/01/2017\n<4>[772156.439241] pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n<4>[772156.439243] pc : z_erofs_put_gbuf+0x64/0x70 [erofs]\n<4>[772156.439252] lr : z_erofs_lz4_decompress+0x600/0x6a0 [erofs]\n..\n<6>[772156.445958] stress (3127): drop_caches: 1\n<4>[772156.446120] Call trace:\n<4>[772156.446121]  z_erofs_put_gbuf+0x64/0x70 [erofs]\n<4>[772156.446761]  z_erofs_lz4_decompress+0x600/0x6a0 [erofs]\n<4>[772156.446897]  z_erofs_decompress_queue+0x740/0xa10 [erofs]\n<4>[772156.447036]  z_erofs_runqueue+0x428/0x8c0 [erofs]\n<4>[772156.447160]  z_erofs_readahead+0x224/0x390 [erofs]\n.."},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: erofs: corrige la ejecución en z_erofs_get_gbuf() En z_erofs_get_gbuf(), la tarea actual se puede migrar a otra CPU entre `z_erofs_gbuf_id()` y `spin_lock(&amp;gbuf-&gt;lock)` . Por lo tanto, z_erofs_put_gbuf() desencadenará el siguiente problema que se encontró en la prueba de estrés: &lt;2&gt;[772156.434168] ERROR del kernel en fs/erofs/zutil.c:58. .. &lt;4&gt;[772156.435007] &lt;4&gt;[772156.439237] CPU: 0 PID: 3078 Comm: estrés Kdump: cargado Contaminado: GE 6.10.0-rc7+ #2 &lt;4&gt;[772156.439239] Nombre de hardware: Alibaba Cloud Alibaba Cloud ECS , BIOS 1.0.0 01/01/2017 &lt;4&gt;[772156.439241] pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) &lt;4&gt;[772156.439243] pc: z_erofs_put_gbuf+0x64/0x70 [erofs] &lt;4&gt;[772156.439252] lr: z_erofs_lz4_decompress+0x600/0x6a0 [erofs] .. &lt;6&gt;[772156.445958] estrés (3127): drop_caches: 1 &lt;4&gt;[772156.446120] Rastreo de llamadas: &lt;4&gt;[772156. 446121] z_erofs_put_gbuf+0x64/0x70 [erofs] &lt;4&gt;[772156.446761] z_erofs_lz4_decompress+0x600/0x6a0 [erofs] &lt;4&gt;[772156.446897] z_erofs_decompress_queue+0x740/0xa10 [erofs &lt;4&gt;[ 772156.447036] z_erofs_runqueue+0x428/0x8c0 [erofs] &lt;4&gt;[772156.447160] z_erofs_readahead+0x224/0x390 [erofs] .."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.0,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-362"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10","versionEndExcluding":"6.10.3","matchCriteriaId":"21DC7A88-E88C-4C44-9AFB-CBB30134097C"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/49b22e06a947727a6d1c802d2d9ad92420b90fc5","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/7dc5537c3f8be87e005f0844a7626c987914f8fd","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}