{"id":"CVE-2024-57807","summary":"scsi: megaraid_sas: Fix for a potential deadlock","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: megaraid_sas: Fix for a potential deadlock\n\nThis fixes a 'possible circular locking dependency detected' warning\n      CPU0                    CPU1\n      ----                    ----\n lock(&instance-\u003ereset_mutex);\n                              lock(&shost-\u003escan_mutex);\n                              lock(&instance-\u003ereset_mutex);\n lock(&shost-\u003escan_mutex);\n\nFix this by temporarily releasing the reset_mutex.","modified":"2026-04-16T04:35:43.330617594Z","published":"2025-01-11T12:39:53.645Z","related":["ALSA-2025:2473","ALSA-2025:2474","SUSE-SU-2025:01919-1","SUSE-SU-2025:1177-1","SUSE-SU-2025:1178-1","SUSE-SU-2025:1180-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","USN-7379-2","USN-7380-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57807.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3c654998a3e8167a58b6c6fede545fe400a4b554"},{"type":"WEB","url":"https://git.kernel.org/stable/c/466ca39dbf5d0ba71c16b15c27478a9c7d4022a8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/50740f4dc78b41dec7c8e39772619d5ba841ddd7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/78afb9bfad00c4aa58a424111d7edbcab9452f2b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/edadc693bfcc0f1ea08b8fa041c9361fd042410d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f36d024bd15ed356a80dda3ddc46d0a62aa55815"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f50783148ec98a1d38b87422e2ceaf2380b7b606"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57807.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57807"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e8c75b5d88f255ac5dcc4a90ae0c300f0b171fe7"},{"fixed":"78afb9bfad00c4aa58a424111d7edbcab9452f2b"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"422fb12054f42c4c82e3959811afd01bc080821a"},{"fixed":"f36d024bd15ed356a80dda3ddc46d0a62aa55815"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ae6874ba4b43c5a00065f48599811a09d33b873d"},{"fixed":"3c654998a3e8167a58b6c6fede545fe400a4b554"},{"fixed":"edadc693bfcc0f1ea08b8fa041c9361fd042410d"},{"fixed":"f50783148ec98a1d38b87422e2ceaf2380b7b606"},{"fixed":"466ca39dbf5d0ba71c16b15c27478a9c7d4022a8"},{"fixed":"50740f4dc78b41dec7c8e39772619d5ba841ddd7"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"5f4f65212e42feaee32533448f1c1defdaa6befa"},{"last_affected":"2262bb7ee19e2d0056ffae84cd1803bd330d06af"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-57807.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}