CVE-2024-43098
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/01/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock<br />
<br />
A deadlock may happen since the i3c_master_register() acquires<br />
&i3cbus->lock twice. See the log below.<br />
Use i3cdev->desc->info instead of calling i3c_device_info() to<br />
avoid acquiring the lock twice.<br />
<br />
v2:<br />
- Modified the title and commit message<br />
<br />
============================================<br />
WARNING: possible recursive locking detected<br />
6.11.0-mainline<br />
--------------------------------------------<br />
init/1 is trying to acquire lock:<br />
f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_bus_normaluse_lock<br />
<br />
but task is already holding lock:<br />
f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_master_register<br />
<br />
other info that might help us debug this:<br />
Possible unsafe locking scenario:<br />
<br />
CPU0<br />
----<br />
lock(&i3cbus->lock);<br />
lock(&i3cbus->lock);<br />
<br />
*** DEADLOCK ***<br />
<br />
May be due to missing lock nesting notation<br />
<br />
2 locks held by init/1:<br />
#0: fcffff809b6798f8 (&dev->mutex){....}-{3:3}, at: __driver_attach<br />
#1: f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_master_register<br />
<br />
stack backtrace:<br />
CPU: 6 UID: 0 PID: 1 Comm: init<br />
Call trace:<br />
dump_backtrace+0xfc/0x17c<br />
show_stack+0x18/0x28<br />
dump_stack_lvl+0x40/0xc0<br />
dump_stack+0x18/0x24<br />
print_deadlock_bug+0x388/0x390<br />
__lock_acquire+0x18bc/0x32ec<br />
lock_acquire+0x134/0x2b0<br />
down_read+0x50/0x19c<br />
i3c_bus_normaluse_lock+0x14/0x24<br />
i3c_device_get_info+0x24/0x58<br />
i3c_device_uevent+0x34/0xa4<br />
dev_uevent+0x310/0x384<br />
kobject_uevent_env+0x244/0x414<br />
kobject_uevent+0x14/0x20<br />
device_add+0x278/0x460<br />
device_register+0x20/0x34<br />
i3c_master_register_new_i3c_devs+0x78/0x154<br />
i3c_master_register+0x6a0/0x6d4<br />
mtk_i3c_master_probe+0x3b8/0x4d8<br />
platform_probe+0xa0/0xe0<br />
really_probe+0x114/0x454<br />
__driver_probe_device+0xa0/0x15c<br />
driver_probe_device+0x3c/0x1ac<br />
__driver_attach+0xc4/0x1f0<br />
bus_for_each_dev+0x104/0x160<br />
driver_attach+0x24/0x34<br />
bus_add_driver+0x14c/0x294<br />
driver_register+0x68/0x104<br />
__platform_driver_register+0x20/0x30<br />
init_module+0x20/0xfe4<br />
do_one_initcall+0x184/0x464<br />
do_init_module+0x58/0x1ec<br />
load_module+0xefc/0x10c8<br />
__arm64_sys_finit_module+0x238/0x33c<br />
invoke_syscall+0x58/0x10c<br />
el0_svc_common+0xa8/0xdc<br />
do_el0_svc+0x1c/0x28<br />
el0_svc+0x50/0xac<br />
el0t_64_sync_handler+0x70/0xbc<br />
el0t_64_sync+0x1a8/0x1ac
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.0 (including) | 5.4.287 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.231 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.174 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.66 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1f51ae217d09c361ede900b94735a6d2df6c0344
- https://git.kernel.org/stable/c/2d98fa2a50b8058de52ada168fa5dbabb574711b
- https://git.kernel.org/stable/c/5ac1dd51aaa0ce8b5421d1137e857955a4b6f55e
- https://git.kernel.org/stable/c/6cf7b65f7029914dc0cd7db86fac9ee5159008c6
- https://git.kernel.org/stable/c/816187b1833908941286e71b0041059a4acd52ed
- https://git.kernel.org/stable/c/9a2173660ee53d5699744f02e6ab7bf89fcd0b1a
- https://git.kernel.org/stable/c/ffe19e363c6f8b992ba835a361542568dea17409
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



