Executive Summary

Informations
Name CVE-2024-47141 First vendor Publication 2025-01-11
Vendor Cve Last vendor Modification 2025-01-31

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

pinmux: Use sequential access to access desc->pinmux data

When two client of the same gpio call pinctrl_select_state() for the same functionality, we are seeing NULL pointer issue while accessing desc->mux_owner.

Let's say two processes A, B executing in pin_request() for the same pin and process A updates the desc->mux_usecount but not yet updated the desc->mux_owner while process B see the desc->mux_usecount which got updated by A path and further executes strcmp and while accessing desc->mux_owner it crashes with NULL pointer.

Serialize the access to mux related setting with a mutex lock.

cpu0 (process A) cpu1(process B)

pinctrl_select_state() { pinctrl_select_state() {
pin_request() { pin_request() {
...
....
} else {
desc->mux_usecount++;
desc->mux_usecount && strcmp(desc->mux_owner, owner)) {

if (desc->mux_usecount > 1)
return 0;
desc->mux_owner = owner;

} }

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47141

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-667 Insufficient Locking

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3700

Sources (Detail)

https://git.kernel.org/stable/c/2da32aed4a97ca1d70fb8b77926f72f30ce5fb4b
https://git.kernel.org/stable/c/5a3e85c3c397c781393ea5fb2f45b1f60f8a4e6e
https://git.kernel.org/stable/c/c11e2ec9a780f54982a187ee10ffd1b810715c85
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2025-06-26 02:35:19
  • Multiple Updates
2025-06-25 12:33:59
  • Multiple Updates
2025-06-24 02:40:00
  • Multiple Updates
2025-05-27 02:44:14
  • Multiple Updates
2025-03-29 03:40:58
  • Multiple Updates
2025-03-28 13:45:16
  • Multiple Updates
2025-03-28 03:19:00
  • Multiple Updates
2025-03-19 03:14:19
  • Multiple Updates
2025-03-18 03:27:15
  • Multiple Updates
2025-03-14 03:14:32
  • Multiple Updates
2025-03-06 14:11:04
  • Multiple Updates
2025-02-22 03:24:38
  • Multiple Updates
2025-01-31 21:20:49
  • Multiple Updates
2025-01-11 17:20:27
  • First insertion