CVE

CVE-2024-46692

Severity:
MEDIUM
Type:
Unavailable / Other
Publication date:
13/09/2024
Last modified:
13/09/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> firmware: qcom: scm: Mark get_wq_ctx() as atomic call<br /> <br /> Currently get_wq_ctx() is wrongly configured as a standard call. When two<br /> SMC calls are in sleep and one SMC wakes up, it calls get_wq_ctx() to<br /> resume the corresponding sleeping thread. But if get_wq_ctx() is<br /> interrupted, goes to sleep and another SMC call is waiting to be allocated<br /> a waitq context, it leads to a deadlock.<br /> <br /> To avoid this get_wq_ctx() must be an atomic call and can&amp;#39;t be a standard<br /> SMC call. Hence mark get_wq_ctx() as a fast call.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.3 (including) 6.6.49 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*