CVE-2024-46692
Severity:
MEDIUM
Type:
Unavailable / Other
Publication date:
13/09/2024
Last modified:
13/09/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
firmware: qcom: scm: Mark get_wq_ctx() as atomic call<br />
<br />
Currently get_wq_ctx() is wrongly configured as a standard call. When two<br />
SMC calls are in sleep and one SMC wakes up, it calls get_wq_ctx() to<br />
resume the corresponding sleeping thread. But if get_wq_ctx() is<br />
interrupted, goes to sleep and another SMC call is waiting to be allocated<br />
a waitq context, it leads to a deadlock.<br />
<br />
To avoid this get_wq_ctx() must be an atomic call and can&#39;t be a standard<br />
SMC call. Hence mark get_wq_ctx() as a fast call.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.3 (including) | 6.6.49 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.8 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page