CVE-2024-49961
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: i2c: ar0521: Use cansleep version of gpiod_set_value()<br />
<br />
If we use GPIO reset from I2C port expander, we must use *_cansleep()<br />
variant of GPIO functions.<br />
This was not done in ar0521_power_on()/ar0521_power_off() functions.<br />
Let&#39;s fix that.<br />
<br />
------------[ cut here ]------------<br />
WARNING: CPU: 0 PID: 11 at drivers/gpio/gpiolib.c:3496 gpiod_set_value+0x74/0x7c<br />
Modules linked in:<br />
CPU: 0 PID: 11 Comm: kworker/u16:0 Not tainted 6.10.0 #53<br />
Hardware name: Diasom DS-RK3568-SOM-EVB (DT)<br />
Workqueue: events_unbound deferred_probe_work_func<br />
pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br />
pc : gpiod_set_value+0x74/0x7c<br />
lr : ar0521_power_on+0xcc/0x290<br />
sp : ffffff8001d7ab70<br />
x29: ffffff8001d7ab70 x28: ffffff80027dcc90 x27: ffffff8003c82000<br />
x26: ffffff8003ca9250 x25: ffffffc080a39c60 x24: ffffff8003ca9088<br />
x23: ffffff8002402720 x22: ffffff8003ca9080 x21: ffffff8003ca9088<br />
x20: 0000000000000000 x19: ffffff8001eb2a00 x18: ffffff80efeeac80<br />
x17: 756d2d6332692f30 x16: 0000000000000000 x15: 0000000000000000<br />
x14: ffffff8001d91d40 x13: 0000000000000016 x12: ffffffc080e98930<br />
x11: ffffff8001eb2880 x10: 0000000000000890 x9 : ffffff8001d7a9f0<br />
x8 : ffffff8001d92570 x7 : ffffff80efeeac80 x6 : 000000003fc6e780<br />
x5 : ffffff8001d91c80 x4 : 0000000000000002 x3 : 0000000000000000<br />
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000001<br />
Call trace:<br />
gpiod_set_value+0x74/0x7c<br />
ar0521_power_on+0xcc/0x290<br />
...
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.55 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2423b60a2d6d27e5f66c5021b494463aef2db212
- https://git.kernel.org/stable/c/3cf00ecfbf11ee8e6afff306a5bdcff4bf95d2cf
- https://git.kernel.org/stable/c/625a77b68c96349c16fcc1faa42784313e0b1a85
- https://git.kernel.org/stable/c/9f08876d766755a92f1b9543ae3ee21bfc596fb8
- https://git.kernel.org/stable/c/bee1aed819a8cda47927436685d216906ed17f62
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



