CVE-2024-45828
i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request
CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request Bus cleanup path in DMA mode may trigger a RING_OP_STAT interrupt when the ring is being stopped. Depending on timing between ring stop request completion, interrupt handler removal and code execution this may lead to a NULL pointer dereference in hci_dma_irq_handler() if it gets to run after the io_data pointer is set to NULL in hci_dma_cleanup(). Prevent this my masking the ring interrupts before ring stop request.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jan 11, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new medium vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0 < a6cddf68b3405b272b5a3cad9657be0b02b34bf4 3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0 < 9d745a56aea45e47f4755bc12e6429d6314dbb54 3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0 < a6dc4b4fda2e147e557050eaae51ff15edeb680b 3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0 < 19cc5767334bfe980f52421627d0826c0da86721 3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0 < 6ca2738174e4ee44edb2ab2d86ce74f015a0cc32
Linux / Linux
5.0
References
git.kernel.org: https://git.kernel.org/stable/c/a6cddf68b3405b272b5a3cad9657be0b02b34bf4 git.kernel.org: https://git.kernel.org/stable/c/9d745a56aea45e47f4755bc12e6429d6314dbb54 git.kernel.org: https://git.kernel.org/stable/c/a6dc4b4fda2e147e557050eaae51ff15edeb680b git.kernel.org: https://git.kernel.org/stable/c/19cc5767334bfe980f52421627d0826c0da86721 git.kernel.org: https://git.kernel.org/stable/c/6ca2738174e4ee44edb2ab2d86ce74f015a0cc32 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html