DEBIAN-CVE-2024-46691

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2024-46691
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-46691.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-46691
Upstream
Published
2024-09-13T06:15:13Z
Modified
2025-09-19T06:15:26Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Move unregister out of atomic section Commit '9329933699b3 ("soc: qcom: pmicglink: Make client-lock non-sleeping")' moved the pmicglink client list under a spinlock, as it is accessed by the rpmsg/glink callback, which in turn is invoked from IRQ context. This means that ucsiunregister() is now called from atomic context, which isn't feasible as it's expecting a sleepable context. An effort is under way to get GLINK to invoke its callbacks in a sleepable context, but until then lets schedule the unregistration. A side effect of this is that ucsiunregister() can now happen after the remote processor, and thereby the communication link with it, is gone. pmicglinksend() is amended with a check to avoid the resulting NULL pointer dereference. This does however result in the user being informed about this error by the following entry in the kernel log: ucsiglink.pmicglinkucsi pmicglink.ucsi.0: failed to send UCSI write request: -5

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.10.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.10.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}