{"id":"CVE-2024-47739","summary":"padata: use integer wrap around to prevent deadlock on seq_nr overflow","details":"In the Linux kernel, the following vulnerability has been resolved:\n\npadata: use integer wrap around to prevent deadlock on seq_nr overflow\n\nWhen submitting more than 2^32 padata objects to padata_do_serial, the\ncurrent sorting implementation incorrectly sorts padata objects with\noverflowed seq_nr, causing them to be placed before existing objects in\nthe reorder list. This leads to a deadlock in the serialization process\nas padata_find_next cannot match padata-\u003eseq_nr and pd-\u003eprocessed\nbecause the padata instance with overflowed seq_nr will be selected\nnext.\n\nTo fix this, we use an unsigned integer wrap around to correctly sort\npadata objects in scenarios with integer overflow.","modified":"2026-03-20T12:39:14.249321Z","published":"2024-10-21T12:14:08.495Z","related":["MGASA-2024-0344","MGASA-2024-0345","SUSE-SU-2024:3983-1","SUSE-SU-2024:3984-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:3986-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47739.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1b8cf11b3ca593a8802a51802cd0c28c38501428"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1bd712de96ad7167fe0d608e706cd60587579f16"},{"type":"WEB","url":"https://git.kernel.org/stable/c/46c4079460f4dcaf445860679558eedef4e1bc91"},{"type":"WEB","url":"https://git.kernel.org/stable/c/72164d5b648951684b1a593996b37a6083c61d7d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9a22b2812393d93d84358a760c347c21939029a6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9e279e6c1f012b82628b89e1b9c65dbefa8ca25a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ab205e1c3846326f162180e56825b4ba38ce9c30"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47739.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47739"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"bfde23ce200e6d33291d29b9b8b60cc2f30f0805"},{"fixed":"46c4079460f4dcaf445860679558eedef4e1bc91"},{"fixed":"72164d5b648951684b1a593996b37a6083c61d7d"},{"fixed":"ab205e1c3846326f162180e56825b4ba38ce9c30"},{"fixed":"1b8cf11b3ca593a8802a51802cd0c28c38501428"},{"fixed":"9e279e6c1f012b82628b89e1b9c65dbefa8ca25a"},{"fixed":"1bd712de96ad7167fe0d608e706cd60587579f16"},{"fixed":"9a22b2812393d93d84358a760c347c21939029a6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47739.json"}}],"schema_version":"1.7.5"}