CVE-2024-47141
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/01/2025
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
pinmux: Use sequential access to access desc->pinmux data<br />
<br />
When two client of the same gpio call pinctrl_select_state() for the<br />
same functionality, we are seeing NULL pointer issue while accessing<br />
desc->mux_owner.<br />
<br />
Let&#39;s say two processes A, B executing in pin_request() for the same pin<br />
and process A updates the desc->mux_usecount but not yet updated the<br />
desc->mux_owner while process B see the desc->mux_usecount which got<br />
updated by A path and further executes strcmp and while accessing<br />
desc->mux_owner it crashes with NULL pointer.<br />
<br />
Serialize the access to mux related setting with a mutex lock.<br />
<br />
cpu0 (process A) cpu1(process B)<br />
<br />
pinctrl_select_state() { pinctrl_select_state() {<br />
pin_request() { pin_request() {<br />
...<br />
....<br />
} else {<br />
desc->mux_usecount++;<br />
desc->mux_usecount && strcmp(desc->mux_owner, owner)) {<br />
<br />
if (desc->mux_usecount > 1)<br />
return 0;<br />
desc->mux_owner = owner;<br />
<br />
} }
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.66 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



