U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-42153 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr When del_timer_sync() is called in an interrupt context it throws a warning because of potential deadlock. The timer is used only to exit from wait_for_completion() after a timeout so replacing the call with wait_for_completion_timeout() allows to remove the problematic timer and its related functions altogether.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/27cd3873fa76ebeb9f948baae40cb9a6d8692289 Mailing List  Patch 
https://git.kernel.org/stable/c/2849a1b747cf37aa5b684527104d3a53f1e296d2 Mailing List  Patch 
https://git.kernel.org/stable/c/3503372d0bf7b324ec0bd6b90606703991426176 Mailing List  Patch 
https://git.kernel.org/stable/c/3d32327f5cfc087ee3922a3bcdcc29880dcdb50f Mailing List  Patch 
https://git.kernel.org/stable/c/92e494a7568b60ae80d57fc0deafcaf3a4029ab3 Mailing List  Patch 
https://git.kernel.org/stable/c/a349e5ab4dc9954746e836cd10b407ce48f9b2f6 Mailing List  Patch 
https://git.kernel.org/stable/c/effe0500afda017a86c94482b1e36bc37586c9af Mailing List  Patch 
https://git.kernel.org/stable/c/f63b94be6942ba82c55343e196bd09b53227618e Mailing List  Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-667 Improper Locking cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-42153
NVD Published Date:
07/30/2024
NVD Last Modified:
08/08/2024
Source:
kernel.org