Improper locking in Linux kernel pinctrl driver



Published: 2024-07-31
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-42090
CWE-ID CWE-667
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper locking

EUVDB-ID: #VU94988

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-42090

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the create_pinctrl() function in drivers/pinctrl/core.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions

External links

http://git.kernel.org/stable/c/e65a0dc2e85efb28e182aca50218e8a056d0ce04
http://git.kernel.org/stable/c/420ce1261907e5dbeda1e4daffd5b6c76f8188c0
http://git.kernel.org/stable/c/b813e3fd102a959c5b208ed68afe27e0137a561b
http://git.kernel.org/stable/c/01fe2f885f7813f8aed5d3704b384a97b1116a9e
http://git.kernel.org/stable/c/b36efd2e3e22a329444b6b24fa48df6d20ae66e6
http://git.kernel.org/stable/c/4038c57bf61631219b31f1bd6e92106ec7f084dc
http://git.kernel.org/stable/c/48a7a7c9571c3e62f17012dd7f2063e926179ddd
http://git.kernel.org/stable/c/adec57ff8e66aee632f3dd1f93787c13d112b7a1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###