CVE-2024-46692

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-46692
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-46692.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-46692
Downstream
Related
Published
2024-09-13T06:15:14Z
Modified
2025-08-09T19:01:27Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

firmware: qcom: scm: Mark getwqctx() as atomic call

Currently getwqctx() is wrongly configured as a standard call. When two SMC calls are in sleep and one SMC wakes up, it calls getwqctx() to resume the corresponding sleeping thread. But if getwqctx() is interrupted, goes to sleep and another SMC call is waiting to be allocated a waitq context, it leads to a deadlock.

To avoid this getwqctx() must be an atomic call and can't be a standard SMC call. Hence mark getwqctx() as a fast call.

References

Affected packages