CVE-2024-42319

Source
https://cve.org/CVERecord?id=CVE-2024-42319
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42319.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42319
Downstream
Related
Published
2024-08-17T09:09:31.867Z
Modified
2026-03-11T07:51:47.750412Z
Summary
mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable()
Details

In the Linux kernel, the following vulnerability has been resolved:

mailbox: mtk-cmdq: Move devmmboxcontrollerregister() after devmpmruntimeenable()

When mtk-cmdq unbinds, a WARNON message with condition pmruntimegetsync() < 0 occurs.

According to the call tracei below: cmdqmboxshutdown mboxfreechannel mboxcontrollerunregister _devmmboxcontrollerunregister ...

The root cause can be deduced to be calling pmruntimegetsync() after calling pmruntimedisable() as observed below: 1. CMDQ driver uses devmmboxcontrollerregister() in cmdqprobe() to bind the cmdq device to the mboxcontroller, so devmmboxcontrollerunregister() will automatically unregister the device bound to the mailbox controller when the device-managed resource is removed. That means devmmboxcontrollerunregister() and cmdqmboxshoutdown() will be called after cmdqremove(). 2. CMDQ driver also uses devmpmruntimeenable() in cmdqprobe() after devmmboxcontrollerregister(), so that devmpmruntimedisable() will be called after cmdqremove(), but before devmmboxcontroller_unregister().

To fix this problem, cmdqprobe() needs to move devmmboxcontrollerregister() after devmpmruntimeenable() to make devmpmruntimedisable() be called after devmmboxcontroller_unregister().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42319.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
623a6143a845bd485b00ba684f0ccef11835edab
Fixed
1403991a40b94438a2acc749bf05c117abdb34f9
Fixed
d00df6700ad10974a7e20646956f4ff22cdbe0ec
Fixed
11fa625b45faf0649118b9deaf2d31c86ac41911
Fixed
a8bd68e4329f9a0ad1b878733e0f80be6a971649

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42319.json"