Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-42087
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-29 Jul, 2024 | 16:26
Updated At-05 Jan, 2026 | 10:51
Rejected At-
▼CVE Numbering Authority (CNA)
drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep

In the Linux kernel, the following vulnerability has been resolved: drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep The ilitek-ili9881c controls the reset GPIO using the non-sleeping gpiod_set_value() function. This complains loudly when the GPIO controller needs to sleep. As the caller can sleep, use gpiod_set_value_cansleep() to fix the issue.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/panel/panel-ilitek-ili9881c.c
Default Status
unaffected
Versions
Affected
  • From 26aec25593c2ee2e24f9facabcf85abba54bdb37 before b71348be1236398be2d04c5e145fd6eaae86a91b (git)
  • From 26aec25593c2ee2e24f9facabcf85abba54bdb37 before 98686ec1824728ff41d7b358131f7d0227c2ba2a (git)
  • From 26aec25593c2ee2e24f9facabcf85abba54bdb37 before cae52f61fda0f5d2949dc177f984c9e187d4c6a0 (git)
  • From 26aec25593c2ee2e24f9facabcf85abba54bdb37 before 489f38de3375ab84b3d269d0a1d64d6ee95d7044 (git)
  • From 26aec25593c2ee2e24f9facabcf85abba54bdb37 before 5f41401219fbe7663b3cf65ebd4ed95ebbb8ffb9 (git)
  • From 26aec25593c2ee2e24f9facabcf85abba54bdb37 before 1618f7a875ffd916596392fd29880c0429b8af60 (git)
  • From 26aec25593c2ee2e24f9facabcf85abba54bdb37 before e646402bf82145349fcf5dcbe395afaf02a8ce47 (git)
  • From 26aec25593c2ee2e24f9facabcf85abba54bdb37 before ee7860cd8b5763017f8dc785c2851fecb7a0c565 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/panel/panel-ilitek-ili9881c.c
Default Status
affected
Versions
Affected
  • 4.19
Unaffected
  • From 0 before 4.19 (semver)
  • From 4.19.317 through 4.19.* (semver)
  • From 5.4.279 through 5.4.* (semver)
  • From 5.10.221 through 5.10.* (semver)
  • From 5.15.162 through 5.15.* (semver)
  • From 6.1.97 through 6.1.* (semver)
  • From 6.6.37 through 6.6.* (semver)
  • From 6.9.8 through 6.9.* (semver)
  • From 6.10 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/b71348be1236398be2d04c5e145fd6eaae86a91b
N/A
https://git.kernel.org/stable/c/98686ec1824728ff41d7b358131f7d0227c2ba2a
N/A
https://git.kernel.org/stable/c/cae52f61fda0f5d2949dc177f984c9e187d4c6a0
N/A
https://git.kernel.org/stable/c/489f38de3375ab84b3d269d0a1d64d6ee95d7044
N/A
https://git.kernel.org/stable/c/5f41401219fbe7663b3cf65ebd4ed95ebbb8ffb9
N/A
https://git.kernel.org/stable/c/1618f7a875ffd916596392fd29880c0429b8af60
N/A
https://git.kernel.org/stable/c/e646402bf82145349fcf5dcbe395afaf02a8ce47
N/A
https://git.kernel.org/stable/c/ee7860cd8b5763017f8dc785c2851fecb7a0c565
N/A
Hyperlink: https://git.kernel.org/stable/c/b71348be1236398be2d04c5e145fd6eaae86a91b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/98686ec1824728ff41d7b358131f7d0227c2ba2a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cae52f61fda0f5d2949dc177f984c9e187d4c6a0
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/489f38de3375ab84b3d269d0a1d64d6ee95d7044
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5f41401219fbe7663b3cf65ebd4ed95ebbb8ffb9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1618f7a875ffd916596392fd29880c0429b8af60
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e646402bf82145349fcf5dcbe395afaf02a8ce47
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ee7860cd8b5763017f8dc785c2851fecb7a0c565
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/b71348be1236398be2d04c5e145fd6eaae86a91b
x_transferred
https://git.kernel.org/stable/c/98686ec1824728ff41d7b358131f7d0227c2ba2a
x_transferred
https://git.kernel.org/stable/c/cae52f61fda0f5d2949dc177f984c9e187d4c6a0
x_transferred
https://git.kernel.org/stable/c/489f38de3375ab84b3d269d0a1d64d6ee95d7044
x_transferred
https://git.kernel.org/stable/c/5f41401219fbe7663b3cf65ebd4ed95ebbb8ffb9
x_transferred
https://git.kernel.org/stable/c/1618f7a875ffd916596392fd29880c0429b8af60
x_transferred
https://git.kernel.org/stable/c/e646402bf82145349fcf5dcbe395afaf02a8ce47
x_transferred
https://git.kernel.org/stable/c/ee7860cd8b5763017f8dc785c2851fecb7a0c565
x_transferred
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
N/A
Hyperlink: https://git.kernel.org/stable/c/b71348be1236398be2d04c5e145fd6eaae86a91b
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/98686ec1824728ff41d7b358131f7d0227c2ba2a
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/cae52f61fda0f5d2949dc177f984c9e187d4c6a0
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/489f38de3375ab84b3d269d0a1d64d6ee95d7044
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/5f41401219fbe7663b3cf65ebd4ed95ebbb8ffb9
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/1618f7a875ffd916596392fd29880c0429b8af60
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/e646402bf82145349fcf5dcbe395afaf02a8ce47
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/ee7860cd8b5763017f8dc785c2851fecb7a0c565
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Resource: N/A
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found