Lucene search

K
cveLinuxCVE-2024-42153
HistoryJul 30, 2024 - 8:15 a.m.

CVE-2024-42153

2024-07-3008:15:06
CWE-667
Linux
web.nvd.nist.gov
39
linux kernel
i2c
pnx
vulnerability
fix
deadlock
warning
timer

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

5.0%

In the Linux kernel, the following vulnerability has been resolved:

i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr

When del_timer_sync() is called in an interrupt context it throws a warning
because of potential deadlock. The timer is used only to exit from
wait_for_completion() after a timeout so replacing the call with
wait_for_completion_timeout() allows to remove the problematic timer and
its related functions altogether.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange2.6.204.19.318
OR
linuxlinux_kernelRange4.205.4.280
OR
linuxlinux_kernelRange5.55.10.222
OR
linuxlinux_kernelRange5.115.15.163
OR
linuxlinux_kernelRange5.166.1.98
OR
linuxlinux_kernelRange6.26.6.39
OR
linuxlinux_kernelRange6.76.9.9
OR
linuxlinux_kernelMatch6.10rc1
OR
linuxlinux_kernelMatch6.10rc2
OR
linuxlinux_kernelMatch6.10rc3
OR
linuxlinux_kernelMatch6.10rc4
OR
linuxlinux_kernelMatch6.10rc5
OR
linuxlinux_kernelMatch6.10rc6
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
linuxlinux_kernel6.10cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/i2c/busses/i2c-pnx.c"
    ],
    "versions": [
      {
        "version": "41561f28e76a",
        "lessThan": "a349e5ab4dc9",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "41561f28e76a",
        "lessThan": "effe0500afda",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "41561f28e76a",
        "lessThan": "2849a1b747cf",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "41561f28e76a",
        "lessThan": "3503372d0bf7",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "41561f28e76a",
        "lessThan": "3d32327f5cfc",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "41561f28e76a",
        "lessThan": "92e494a7568b",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "41561f28e76a",
        "lessThan": "27cd3873fa76",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "41561f28e76a",
        "lessThan": "f63b94be6942",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/i2c/busses/i2c-pnx.c"
    ],
    "versions": [
      {
        "version": "2.6.20",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "2.6.20",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.318",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.280",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.222",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.163",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.98",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.39",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9.9",
        "lessThanOrEqual": "6.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

5.0%