Lucene search

K
cveLinuxCVE-2024-42090
HistoryJul 29, 2024 - 5:15 p.m.

CVE-2024-42090

2024-07-2917:15:11
CWE-667
Linux
web.nvd.nist.gov
35
linux
kernel
vulnerability
cve-2024-42090
resolved
deadlock
pinctrl
fix
create_pinctrl
add_setting
pinctrl_free
coverity static analysis security testing
synopsys
inc.

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

Low

EPSS

0

Percentile

5.0%

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER

In create_pinctrl(), pinctrl_maps_mutex is acquired before calling
add_setting(). If add_setting() returns -EPROBE_DEFER, create_pinctrl()
calls pinctrl_free(). However, pinctrl_free() attempts to acquire
pinctrl_maps_mutex, which is already held by create_pinctrl(), leading to
a potential deadlock.

This patch resolves the issue by releasing pinctrl_maps_mutex before
calling pinctrl_free(), preventing the deadlock.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange3.104.19.317
OR
linuxlinux_kernelRange4.205.4.279
OR
linuxlinux_kernelRange5.55.10.221
OR
linuxlinux_kernelRange5.115.15.162
OR
linuxlinux_kernelRange5.166.1.97
OR
linuxlinux_kernelRange6.26.6.37
OR
linuxlinux_kernelRange6.76.9.8
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/pinctrl/core.c"
    ],
    "versions": [
      {
        "version": "42fed7ba44e4",
        "lessThan": "e65a0dc2e85e",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "42fed7ba44e4",
        "lessThan": "420ce1261907",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "42fed7ba44e4",
        "lessThan": "b813e3fd102a",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "42fed7ba44e4",
        "lessThan": "01fe2f885f78",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "42fed7ba44e4",
        "lessThan": "b36efd2e3e22",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "42fed7ba44e4",
        "lessThan": "4038c57bf616",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "42fed7ba44e4",
        "lessThan": "48a7a7c9571c",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "42fed7ba44e4",
        "lessThan": "adec57ff8e66",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/pinctrl/core.c"
    ],
    "versions": [
      {
        "version": "3.10",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "3.10",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.317",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.279",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.221",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.162",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.97",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.37",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9.8",
        "lessThanOrEqual": "6.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

Low

EPSS

0

Percentile

5.0%