Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-51293.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-51293
Upstream
Published
2024-10-21T20:15:17Z
Modified
2026-04-01T05:16:24.491969Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
CVE-2024-50057 affecting package kernel for versions less than 6.6.57.1-1
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tipd: Free IRQ only if it was requested before

In polling mode, if no IRQ was requested there is no need to free it. Call devmfreeirq() only if client->irq is set. This fixes the warning caused by the tps6598x module removal:

WARNING: CPU: 2 PID: 333 at kernel/irq/devres.c:144 devmfreeirq+0x80/0x8c ... ... Call trace: devmfreeirq+0x80/0x8c tps6598xremove+0x28/0x88 [tps6598x] i2cdeviceremove+0x2c/0x9c deviceremove+0x4c/0x80 devicereleasedriverinternal+0x1cc/0x228 driverdetach+0x50/0x98 busremovedriver+0x6c/0xbc driverunregister+0x30/0x60 i2cdeldriver+0x54/0x64 tps6598xi2cdriverexit+0x18/0xc3c [tps6598x] __arm64sysdeletemodule+0x184/0x264 invokesyscall+0x48/0x110 el0svccommon.constprop.0+0xc8/0xe8 doel0svc+0x20/0x2c el0svc+0x28/0x98 el0t64synchandler+0x13c/0x158 el0t64sync+0x190/0x194

References

Affected packages

Azure Linux:3 / kernel

Package

Name
kernel
Purl
pkg:rpm/azure-linux/kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.57.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-51293.json"