{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-42090","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-07-29T15:50:41.172Z","datePublished":"2024-07-29T16:26:30.139Z","dateUpdated":"2025-11-03T22:01:23.115Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:22:46.924Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER\n\nIn create_pinctrl(), pinctrl_maps_mutex is acquired before calling\nadd_setting(). If add_setting() returns -EPROBE_DEFER, create_pinctrl()\ncalls pinctrl_free(). However, pinctrl_free() attempts to acquire\npinctrl_maps_mutex, which is already held by create_pinctrl(), leading to\na potential deadlock.\n\nThis patch resolves the issue by releasing pinctrl_maps_mutex before\ncalling pinctrl_free(), preventing the deadlock.\n\nThis bug was discovered and resolved using Coverity Static Analysis\nSecurity Testing (SAST) by Synopsys, Inc."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/pinctrl/core.c"],"versions":[{"version":"42fed7ba44e4e8c1fb27b28ad14490cb1daff3c7","lessThan":"e65a0dc2e85efb28e182aca50218e8a056d0ce04","status":"affected","versionType":"git"},{"version":"42fed7ba44e4e8c1fb27b28ad14490cb1daff3c7","lessThan":"420ce1261907e5dbeda1e4daffd5b6c76f8188c0","status":"affected","versionType":"git"},{"version":"42fed7ba44e4e8c1fb27b28ad14490cb1daff3c7","lessThan":"b813e3fd102a959c5b208ed68afe27e0137a561b","status":"affected","versionType":"git"},{"version":"42fed7ba44e4e8c1fb27b28ad14490cb1daff3c7","lessThan":"01fe2f885f7813f8aed5d3704b384a97b1116a9e","status":"affected","versionType":"git"},{"version":"42fed7ba44e4e8c1fb27b28ad14490cb1daff3c7","lessThan":"b36efd2e3e22a329444b6b24fa48df6d20ae66e6","status":"affected","versionType":"git"},{"version":"42fed7ba44e4e8c1fb27b28ad14490cb1daff3c7","lessThan":"4038c57bf61631219b31f1bd6e92106ec7f084dc","status":"affected","versionType":"git"},{"version":"42fed7ba44e4e8c1fb27b28ad14490cb1daff3c7","lessThan":"48a7a7c9571c3e62f17012dd7f2063e926179ddd","status":"affected","versionType":"git"},{"version":"42fed7ba44e4e8c1fb27b28ad14490cb1daff3c7","lessThan":"adec57ff8e66aee632f3dd1f93787c13d112b7a1","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/pinctrl/core.c"],"versions":[{"version":"3.10","status":"affected"},{"version":"0","lessThan":"3.10","status":"unaffected","versionType":"semver"},{"version":"4.19.317","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.279","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.221","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.162","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.97","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.37","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.9.8","lessThanOrEqual":"6.9.*","status":"unaffected","versionType":"semver"},{"version":"6.10","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"4.19.317"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"5.4.279"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"5.10.221"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"5.15.162"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"6.1.97"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"6.6.37"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"6.9.8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.10","versionEndExcluding":"6.10"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/e65a0dc2e85efb28e182aca50218e8a056d0ce04"},{"url":"https://git.kernel.org/stable/c/420ce1261907e5dbeda1e4daffd5b6c76f8188c0"},{"url":"https://git.kernel.org/stable/c/b813e3fd102a959c5b208ed68afe27e0137a561b"},{"url":"https://git.kernel.org/stable/c/01fe2f885f7813f8aed5d3704b384a97b1116a9e"},{"url":"https://git.kernel.org/stable/c/b36efd2e3e22a329444b6b24fa48df6d20ae66e6"},{"url":"https://git.kernel.org/stable/c/4038c57bf61631219b31f1bd6e92106ec7f084dc"},{"url":"https://git.kernel.org/stable/c/48a7a7c9571c3e62f17012dd7f2063e926179ddd"},{"url":"https://git.kernel.org/stable/c/adec57ff8e66aee632f3dd1f93787c13d112b7a1"}],"title":"pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/e65a0dc2e85efb28e182aca50218e8a056d0ce04","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/420ce1261907e5dbeda1e4daffd5b6c76f8188c0","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/b813e3fd102a959c5b208ed68afe27e0137a561b","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/01fe2f885f7813f8aed5d3704b384a97b1116a9e","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/b36efd2e3e22a329444b6b24fa48df6d20ae66e6","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/4038c57bf61631219b31f1bd6e92106ec7f084dc","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/48a7a7c9571c3e62f17012dd7f2063e926179ddd","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/adec57ff8e66aee632f3dd1f93787c13d112b7a1","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:01:23.115Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-42090","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T16:18:41.131591Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:33:01.081Z"}}]}}