๐Ÿ” CVE Alert

CVE-2024-45828

MEDIUM 5.5

i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request Bus cleanup path in DMA mode may trigger a RING_OP_STAT interrupt when the ring is being stopped. Depending on timing between ring stop request completion, interrupt handler removal and code execution this may lead to a NULL pointer dereference in hci_dma_irq_handler() if it gets to run after the io_data pointer is set to NULL in hci_dma_cleanup(). Prevent this my masking the ring interrupts before ring stop request.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 11, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0 < a6cddf68b3405b272b5a3cad9657be0b02b34bf4 3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0 < 9d745a56aea45e47f4755bc12e6429d6314dbb54 3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0 < a6dc4b4fda2e147e557050eaae51ff15edeb680b 3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0 < 19cc5767334bfe980f52421627d0826c0da86721 3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0 < 6ca2738174e4ee44edb2ab2d86ce74f015a0cc32
Linux / Linux
5.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a6cddf68b3405b272b5a3cad9657be0b02b34bf4 git.kernel.org: https://git.kernel.org/stable/c/9d745a56aea45e47f4755bc12e6429d6314dbb54 git.kernel.org: https://git.kernel.org/stable/c/a6dc4b4fda2e147e557050eaae51ff15edeb680b git.kernel.org: https://git.kernel.org/stable/c/19cc5767334bfe980f52421627d0826c0da86721 git.kernel.org: https://git.kernel.org/stable/c/6ca2738174e4ee44edb2ab2d86ce74f015a0cc32 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html