drm/lima: fix shared irq handling on driver remove
lima uses a shared interrupt, so the interrupt handlers must be prepared
to be called at any time. At driver removal time, the clocks are
disabled early and the interrupts stay registered until the very end of
the remove process due to the devm usage.
This is potentially a bug as the interrupts access device registers
which assumes clocks are enabled. A crash can be triggered by removing
the driver in a kernel with CONFIG_DEBUG_SHIRQ enabled.
This patch frees the interrupts at each lima device finishing callback
so that the handlers are already unregistered by the time we fully
disable clocks.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-4008-1 | linux-6.1 security update |
![]() |
DSA-5747-1 | linux security update |
![]() |
USN-7003-1 | Linux kernel vulnerabilities |
![]() |
USN-7003-2 | Linux kernel vulnerabilities |
![]() |
USN-7003-3 | Linux kernel vulnerabilities |
![]() |
USN-7003-4 | Linux kernel vulnerabilities |
![]() |
USN-7003-5 | Linux kernel vulnerabilities |
![]() |
USN-7006-1 | Linux kernel vulnerabilities |
![]() |
USN-7007-1 | Linux kernel vulnerabilities |
![]() |
USN-7007-2 | Linux kernel vulnerabilities |
![]() |
USN-7007-3 | Linux kernel vulnerabilities |
![]() |
USN-7009-1 | Linux kernel vulnerabilities |
![]() |
USN-7009-2 | Linux kernel vulnerabilities |
![]() |
USN-7019-1 | Linux kernel vulnerabilities |
![]() |
USN-7089-1 | Linux kernel vulnerabilities |
![]() |
USN-7089-2 | Linux kernel vulnerabilities |
![]() |
USN-7089-3 | Linux kernel vulnerabilities |
![]() |
USN-7089-4 | Linux kernel vulnerabilities |
![]() |
USN-7089-5 | Linux kernel vulnerabilities |
![]() |
USN-7089-6 | Linux kernel vulnerabilities |
![]() |
USN-7089-7 | Linux kernel (Low Latency) vulnerabilities |
![]() |
USN-7090-1 | Linux kernel vulnerabilities |
![]() |
USN-7095-1 | Linux kernel vulnerabilities |
![]() |
USN-7156-1 | Linux kernel (GKE) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 06 Oct 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 25 Oct 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-664 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-07-28T11:16:37.126Z
Reserved: 2024-07-29T15:50:41.184Z
Link: CVE-2024-42127

Updated: 2024-08-02T04:54:32.183Z

Status : Analyzed
Published: 2024-07-30T08:15:04.820
Modified: 2025-10-06T17:13:31.870
Link: CVE-2024-42127


Updated: 2025-07-13T11:32:20Z