We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56625

can: dev: can_set_termination(): allow sleeping GPIOs



Description

In the Linux kernel, the following vulnerability has been resolved: can: dev: can_set_termination(): allow sleeping GPIOs In commit 6e86a1543c37 ("can: dev: provide optional GPIO based termination support") GPIO based termination support was added. For no particular reason that patch uses gpiod_set_value() to set the GPIO. This leads to the following warning, if the systems uses a sleeping GPIO, i.e. behind an I2C port expander: | WARNING: CPU: 0 PID: 379 at /drivers/gpio/gpiolib.c:3496 gpiod_set_value+0x50/0x6c | CPU: 0 UID: 0 PID: 379 Comm: ip Not tainted 6.11.0-20241016-1 #1 823affae360cc91126e4d316d7a614a8bf86236c Replace gpiod_set_value() by gpiod_set_value_cansleep() to allow the use of sleeping GPIOs.

Reserved 2024-12-27 | Published 2024-12-27 | Updated 2025-01-20 | Assigner Linux

Product status

Default status
unaffected

6e86a1543c378f2e8837ad88f361b7bf606c80f7 before faa0a1975a6fbce30616775216606eb8d6388ea1
affected

6e86a1543c378f2e8837ad88f361b7bf606c80f7 before 46637a608fb1ee871a0ad8bf70d917d5d95ac251
affected

6e86a1543c378f2e8837ad88f361b7bf606c80f7 before 1ac442f25c19953d2f33b92549628b0aeac83db6
affected

6e86a1543c378f2e8837ad88f361b7bf606c80f7 before 3b0c5bb437d31a9864f633b85cbc42d2f6c51c96
affected

6e86a1543c378f2e8837ad88f361b7bf606c80f7 before ee1dfbdd8b4b6de85e96ae2059dc9c1bdb6b49b5
affected

Default status
affected

5.15
affected

Any version before 5.15
unaffected

5.15.174
unaffected

6.1.120
unaffected

6.6.66
unaffected

6.12.5
unaffected

6.13
unaffected

References

git.kernel.org/...c/faa0a1975a6fbce30616775216606eb8d6388ea1

git.kernel.org/...c/46637a608fb1ee871a0ad8bf70d917d5d95ac251

git.kernel.org/...c/1ac442f25c19953d2f33b92549628b0aeac83db6

git.kernel.org/...c/3b0c5bb437d31a9864f633b85cbc42d2f6c51c96

git.kernel.org/...c/ee1dfbdd8b4b6de85e96ae2059dc9c1bdb6b49b5

cve.org (CVE-2024-56625)

nvd.nist.gov (CVE-2024-56625)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56625

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.