CVE-2024-56625

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-56625
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56625.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56625
Downstream
Related
Published
2024-12-27T15:15:22Z
Modified
2025-08-09T20:01:27Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

can: dev: cansettermination(): allow sleeping GPIOs

In commit 6e86a1543c37 ("can: dev: provide optional GPIO based termination support") GPIO based termination support was added.

For no particular reason that patch uses gpiodsetvalue() to set the GPIO. This leads to the following warning, if the systems uses a sleeping GPIO, i.e. behind an I2C port expander:

| WARNING: CPU: 0 PID: 379 at /drivers/gpio/gpiolib.c:3496 gpiodsetvalue+0x50/0x6c | CPU: 0 UID: 0 PID: 379 Comm: ip Not tainted 6.11.0-20241016-1 #1 823affae360cc91126e4d316d7a614a8bf86236c

Replace gpiodsetvalue() by gpiodsetvalue_cansleep() to allow the use of sleeping GPIOs.

References

Affected packages