pinctrl:ocelot:修复基于级别的中断上的系统挂起(CVE-2024-50196)

admin 2024-11-10 19:27:22 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
pinctrl:ocelot:修复基于级别的中断上的系统挂起(CVE-2024-50196)

CVE编号

CVE-2024-50196

利用情况

暂无

补丁情况

N/A

披露时间

2024-11-08
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: pinctrl: ocelot: fix system hang on level based interrupts The current implementation only calls chained_irq_enter() and chained_irq_exit() if it detects pending interrupts. ``` for (i = 0; i < info->stride; i++) { uregmap_read(info->map, id_reg + 4 * i, &reg); if (!reg) continue; chained_irq_enter(parent_chip, desc); ``` However, in case of GPIO pin configured in level mode and the parent controller configured in edge mode, GPIO interrupt might be lowered by the hardware. In the result, if the interrupt is short enough, the parent interrupt is still pending while the GPIO interrupt is cleared; chained_irq_enter() never gets called and the system hangs trying to service the parent interrupt. Moving chained_irq_enter() and chained_irq_exit() outside the for loop ensures that they are called even when GPIO interrupt is lowered by the hardware. The similar code with chained_irq_enter() / chained_irq_exit() functions wrapping interrupt checking loop may be found in many other drivers: ``` grep -r -A 10 chained_irq_enter drivers/pinctrl ```
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/20728e86289ab463b99b7ab4425515bd26aba417
https://git.kernel.org/stable/c/4a81800ef05bea5a9896f199677f7b7f5020776a
https://git.kernel.org/stable/c/655f5d4662b958122b260be05aa6dfdf8768efe6
https://git.kernel.org/stable/c/93b8ddc54507a227087c60a0013ed833b6ae7d3c
https://git.kernel.org/stable/c/dcbe9954634807ec54e22bde278b5b269f921381
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_12 linux * Up to (excluding) 6.1.115-1
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0