We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47141

pinmux: Use sequential access to access desc->pinmux data



Description

In the Linux kernel, the following vulnerability has been resolved: pinmux: Use sequential access to access desc->pinmux data When two client of the same gpio call pinctrl_select_state() for the same functionality, we are seeing NULL pointer issue while accessing desc->mux_owner. Let's say two processes A, B executing in pin_request() for the same pin and process A updates the desc->mux_usecount but not yet updated the desc->mux_owner while process B see the desc->mux_usecount which got updated by A path and further executes strcmp and while accessing desc->mux_owner it crashes with NULL pointer. Serialize the access to mux related setting with a mutex lock. cpu0 (process A) cpu1(process B) pinctrl_select_state() { pinctrl_select_state() { pin_request() { pin_request() { ... .... } else { desc->mux_usecount++; desc->mux_usecount && strcmp(desc->mux_owner, owner)) { if (desc->mux_usecount > 1) return 0; desc->mux_owner = owner; } }

Reserved 2025-01-09 | Published 2025-01-11 | Updated 2025-01-11 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 2da32aed4a97ca1d70fb8b77926f72f30ce5fb4b
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before c11e2ec9a780f54982a187ee10ffd1b810715c85
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 5a3e85c3c397c781393ea5fb2f45b1f60f8a4e6e
affected

Default status
affected

6.6.66
unaffected

6.12.5
unaffected

6.13-rc1
unaffected

References

git.kernel.org/...c/2da32aed4a97ca1d70fb8b77926f72f30ce5fb4b

git.kernel.org/...c/c11e2ec9a780f54982a187ee10ffd1b810715c85

git.kernel.org/...c/5a3e85c3c397c781393ea5fb2f45b1f60f8a4e6e

cve.org (CVE-2024-47141)

nvd.nist.gov (CVE-2024-47141)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-47141

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.