๐Ÿ” CVE Alert

CVE-2024-50196

MEDIUM 5.5

pinctrl: ocelot: fix system hang on level based interrupts

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: pinctrl: ocelot: fix system hang on level based interrupts The current implementation only calls chained_irq_enter() and chained_irq_exit() if it detects pending interrupts. ``` for (i = 0; i < info->stride; i++) { uregmap_read(info->map, id_reg + 4 * i, &reg); if (!reg) continue; chained_irq_enter(parent_chip, desc); ``` However, in case of GPIO pin configured in level mode and the parent controller configured in edge mode, GPIO interrupt might be lowered by the hardware. In the result, if the interrupt is short enough, the parent interrupt is still pending while the GPIO interrupt is cleared; chained_irq_enter() never gets called and the system hangs trying to service the parent interrupt. Moving chained_irq_enter() and chained_irq_exit() outside the for loop ensures that they are called even when GPIO interrupt is lowered by the hardware. The similar code with chained_irq_enter() / chained_irq_exit() functions wrapping interrupt checking loop may be found in many other drivers: ``` grep -r -A 10 chained_irq_enter drivers/pinctrl ```

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 8, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ce8dc0943357a5d10b05dcf0556b537c1d7b8b1f < 655f5d4662b958122b260be05aa6dfdf8768efe6 ce8dc0943357a5d10b05dcf0556b537c1d7b8b1f < 4a81800ef05bea5a9896f199677f7b7f5020776a ce8dc0943357a5d10b05dcf0556b537c1d7b8b1f < 20728e86289ab463b99b7ab4425515bd26aba417 ce8dc0943357a5d10b05dcf0556b537c1d7b8b1f < dcbe9954634807ec54e22bde278b5b269f921381 ce8dc0943357a5d10b05dcf0556b537c1d7b8b1f < 93b8ddc54507a227087c60a0013ed833b6ae7d3c
Linux / Linux
4.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/655f5d4662b958122b260be05aa6dfdf8768efe6 git.kernel.org: https://git.kernel.org/stable/c/4a81800ef05bea5a9896f199677f7b7f5020776a git.kernel.org: https://git.kernel.org/stable/c/20728e86289ab463b99b7ab4425515bd26aba417 git.kernel.org: https://git.kernel.org/stable/c/dcbe9954634807ec54e22bde278b5b269f921381 git.kernel.org: https://git.kernel.org/stable/c/93b8ddc54507a227087c60a0013ed833b6ae7d3c lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html