CVE-2024-50196

Source
https://cve.org/CVERecord?id=CVE-2024-50196
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50196.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50196
Downstream
Related
Published
2024-11-08T05:54:10.949Z
Modified
2026-03-20T12:39:37.959545Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
pinctrl: ocelot: fix system hang on level based interrupts
Details

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: ocelot: fix system hang on level based interrupts

The current implementation only calls chainedirqenter() and chainedirqexit() if it detects pending interrupts.

for (i = 0; i < info->stride; i++) {
    uregmap_read(info->map, id_reg + 4 * i, &reg);
    if (!reg)
        continue;

    chained_irq_enter(parent_chip, desc);

However, in case of GPIO pin configured in level mode and the parent controller configured in edge mode, GPIO interrupt might be lowered by the hardware. In the result, if the interrupt is short enough, the parent interrupt is still pending while the GPIO interrupt is cleared; chainedirqenter() never gets called and the system hangs trying to service the parent interrupt.

Moving chainedirqenter() and chainedirqexit() outside the for loop ensures that they are called even when GPIO interrupt is lowered by the hardware.

The similar code with chainedirqenter() / chainedirqexit() functions wrapping interrupt checking loop may be found in many other drivers:

grep -r -A 10 chained_irq_enter drivers/pinctrl
Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50196.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ce8dc0943357a5d10b05dcf0556b537c1d7b8b1f
Fixed
655f5d4662b958122b260be05aa6dfdf8768efe6
Fixed
4a81800ef05bea5a9896f199677f7b7f5020776a
Fixed
20728e86289ab463b99b7ab4425515bd26aba417
Fixed
dcbe9954634807ec54e22bde278b5b269f921381
Fixed
93b8ddc54507a227087c60a0013ed833b6ae7d3c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50196.json"