Linux Kernel Vulnerability Fix: Move unregister out of atomic section
CVE-2024-46691
What is CVE-2024-46691?
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: ucsi: Move unregister out of atomic section
Commit '9329933699b3 ("soc: qcom: pmic_glink: Make client-lock non-sleeping")' moved the pmic_glink client list under a spinlock, as it is accessed by the rpmsg/glink callback, which in turn is invoked from IRQ context.
This means that ucsi_unregister() is now called from atomic context, which isn't feasible as it's expecting a sleepable context. An effort is under way to get GLINK to invoke its callbacks in a sleepable context, but until then lets schedule the unregistration.
A side effect of this is that ucsi_unregister() can now happen after the remote processor, and thereby the communication link with it, is gone. pmic_glink_send() is amended with a check to avoid the resulting NULL pointer dereference. This does however result in the user being informed about this error by the following entry in the kernel log:
ucsi_glink.pmic_glink_ucsi pmic_glink.ucsi.0: failed to send UCSI write request: -5

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Linux fbadcde1572f6b00e1e343d8b24ec8bf7f3ec08d < 1e3769aa0946c2b6e509c06d7a0aa9b955eaef9e
Linux 9329933699b32d467a99befa20415c4b2172389a < 095b0001aefddcd9361097c971b7debc84e72714
Linux 9329933699b32d467a99befa20415c4b2172389a < 11bb2ffb679399f99041540cf662409905179e3a