CVE-2024-46691

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-46691
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-46691.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-46691
Downstream
Related
Published
2024-09-13T06:15:13Z
Modified
2024-09-18T01:00:21Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Move unregister out of atomic section

Commit '9329933699b3 ("soc: qcom: pmicglink: Make client-lock non-sleeping")' moved the pmicglink client list under a spinlock, as it is accessed by the rpmsg/glink callback, which in turn is invoked from IRQ context.

This means that ucsi_unregister() is now called from atomic context, which isn't feasible as it's expecting a sleepable context. An effort is under way to get GLINK to invoke its callbacks in a sleepable context, but until then lets schedule the unregistration.

A side effect of this is that ucsiunregister() can now happen after the remote processor, and thereby the communication link with it, is gone. pmicglink_send() is amended with a check to avoid the resulting NULL pointer dereference. This does however result in the user being informed about this error by the following entry in the kernel log:

ucsiglink.pmicglinkucsi pmicglink.ucsi.0: failed to send UCSI write request: -5

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.10.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}