CVE-2024-42090

5.5 MEDIUM

📋 TL;DR

This CVE describes a deadlock vulnerability in the Linux kernel's pinctrl subsystem. When the kernel encounters a -EPROBE_DEFER error during device initialization, it can deadlock while holding a mutex, potentially causing system instability or denial of service. This affects all Linux systems using the vulnerable pinctrl code.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE, but includes versions with the vulnerable pinctrl code before the fix commits.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires pinctrl subsystem usage and -EPROBE_DEFER conditions during device initialization.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System deadlock requiring hard reboot, leading to denial of service and potential data loss or corruption.

🟠

Likely Case

System instability during device initialization, causing intermittent failures or system hangs.

🟢

If Mitigated

Minor performance impact during device probing with proper error handling.

🌐 Internet-Facing: LOW - This is a local kernel deadlock issue, not remotely exploitable.
🏢 Internal Only: MEDIUM - Can cause system instability affecting services and availability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires specific device initialization conditions to trigger.

This is a reliability issue rather than a security vulnerability that enables privilege escalation or code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing the fix commits: 01fe2f885f7813f8aed5d3704b384a97b1116a9e, 4038c57bf61631219b31f1bd6e92106ec7f084dc, 420ce1261907e5dbeda1e4daffd5b6c76f8188c0, 48a7a7c9571c3e62f17012dd7f2063e926179ddd, adec57ff8e66aee632f3dd1f93787c13d112b7a1

Vendor Advisory: https://git.kernel.org/stable/c/01fe2f885f7813f8aed5d3704b384a97b1116a9e

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Avoid pinctrl device initialization issues

linux

Ensure proper device tree configuration to minimize -EPROBE_DEFER conditions.

🧯 If You Can't Patch

  • Monitor system logs for deadlock indicators and restart affected services
  • Implement high availability configurations to minimize impact of potential system instability

🔍 How to Verify

Check if Vulnerable:

Check kernel version and compare with fix commits: uname -r and examine kernel source for pinctrl deadlock fix

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or check with distribution-specific security tools

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System hang during boot
  • pinctrl subsystem error messages

Network Indicators:

  • None - this is a local kernel issue

SIEM Query:

Search for: 'kernel panic' OR 'deadlock' OR 'pinctrl' in system logs

🔗 References

📤 Share & Export