Skip to main content

CVE-2024-49961: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-49961cvecve-2024-49961
Published: Mon Oct 21 2024 (10/21/2024, 18:02:13 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: media: i2c: ar0521: Use cansleep version of gpiod_set_value() If we use GPIO reset from I2C port expander, we must use *_cansleep() variant of GPIO functions. This was not done in ar0521_power_on()/ar0521_power_off() functions. Let's fix that. ------------[ cut here ]------------ WARNING: CPU: 0 PID: 11 at drivers/gpio/gpiolib.c:3496 gpiod_set_value+0x74/0x7c Modules linked in: CPU: 0 PID: 11 Comm: kworker/u16:0 Not tainted 6.10.0 #53 Hardware name: Diasom DS-RK3568-SOM-EVB (DT) Workqueue: events_unbound deferred_probe_work_func pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : gpiod_set_value+0x74/0x7c lr : ar0521_power_on+0xcc/0x290 sp : ffffff8001d7ab70 x29: ffffff8001d7ab70 x28: ffffff80027dcc90 x27: ffffff8003c82000 x26: ffffff8003ca9250 x25: ffffffc080a39c60 x24: ffffff8003ca9088 x23: ffffff8002402720 x22: ffffff8003ca9080 x21: ffffff8003ca9088 x20: 0000000000000000 x19: ffffff8001eb2a00 x18: ffffff80efeeac80 x17: 756d2d6332692f30 x16: 0000000000000000 x15: 0000000000000000 x14: ffffff8001d91d40 x13: 0000000000000016 x12: ffffffc080e98930 x11: ffffff8001eb2880 x10: 0000000000000890 x9 : ffffff8001d7a9f0 x8 : ffffff8001d92570 x7 : ffffff80efeeac80 x6 : 000000003fc6e780 x5 : ffffff8001d91c80 x4 : 0000000000000002 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000001 Call trace: gpiod_set_value+0x74/0x7c ar0521_power_on+0xcc/0x290 ...

AI-Powered Analysis

AILast updated: 06/28/2025, 15:40:31 UTC

Technical Analysis

CVE-2024-49961 is a vulnerability identified in the Linux kernel, specifically within the media subsystem's I2C driver for the AR0521 image sensor. The issue arises from improper use of GPIO (General Purpose Input/Output) functions in the ar0521_power_on() and ar0521_power_off() functions. The Linux kernel provides two variants of GPIO control functions: standard gpiod_set_value() and a variant designed for GPIO lines that may sleep, gpiod_set_value_cansleep(). The vulnerability stems from the driver using the non-sleepable version gpiod_set_value() when controlling GPIO reset lines from an I2C port expander, which requires the cansleep variant due to potential sleeping behavior. This misuse can lead to kernel warnings and potentially unstable behavior, as indicated by the kernel warning trace included in the description. The improper GPIO handling can cause race conditions or deadlocks in kernel threads, potentially leading to system instability or crashes. Although no known exploits are reported in the wild, the vulnerability affects the Linux kernel version 6.10.0 and likely other versions incorporating the affected driver code. The patch involves replacing gpiod_set_value() calls with gpiod_set_value_cansleep() in the affected functions to ensure proper handling of GPIO lines that may sleep, thus preventing kernel warnings and improving driver stability. This vulnerability is technical and specific to embedded or specialized hardware platforms using the AR0521 sensor with I2C GPIO reset lines, such as the Diasom DS-RK3568-SOM-EVB hardware referenced in the kernel warning trace.

Potential Impact

For European organizations, the impact of CVE-2024-49961 is primarily on systems running Linux kernels with the affected AR0521 I2C driver, typically embedded devices or specialized hardware platforms using this sensor. The vulnerability can cause kernel warnings and potentially system instability or crashes due to improper GPIO handling. This may lead to denial of service (DoS) conditions on affected devices, impacting availability. Confidentiality and integrity impacts are minimal as the vulnerability does not directly enable privilege escalation or arbitrary code execution. However, system crashes or instability in critical embedded systems could disrupt operations, especially in industrial control systems, IoT deployments, or specialized media processing equipment. European organizations relying on embedded Linux devices with AR0521 sensors in sectors such as manufacturing, telecommunications, or automotive may experience operational disruptions if the vulnerability is exploited or triggered. Since no known exploits exist, the immediate risk is low, but unpatched systems remain vulnerable to stability issues. The vulnerability highlights the importance of timely kernel updates and hardware driver patches to maintain system reliability.

Mitigation Recommendations

1. Apply the official Linux kernel patches that replace gpiod_set_value() with gpiod_set_value_cansleep() in the ar0521_power_on() and ar0521_power_off() functions. Monitor Linux kernel mailing lists or vendor advisories for updated kernel releases containing this fix. 2. For organizations using custom or embedded Linux distributions, rebuild the kernel with the patched driver code to ensure the fix is incorporated. 3. Conduct thorough testing of embedded devices using the AR0521 sensor after patching to verify stability and absence of kernel warnings or crashes. 4. Implement monitoring for kernel warnings or unusual system logs related to GPIO operations on affected devices to detect potential issues early. 5. Limit exposure of embedded devices running the vulnerable kernel by isolating them within secure network segments and restricting access to trusted personnel. 6. Maintain an inventory of hardware platforms using the AR0521 sensor or similar I2C GPIO reset configurations to prioritize patching efforts. 7. Engage with hardware vendors or Linux distribution maintainers to ensure timely delivery of patches and updates for affected devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.049Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfb6c

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 3:40:31 PM

Last updated: 8/15/2025, 7:28:36 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats