Executive Summary

Informations
Name CVE-2024-46691 First vendor Publication 2024-09-13
Vendor Cve Last vendor Modification 2024-09-13

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Move unregister out of atomic section

Commit '9329933699b3 ("soc: qcom: pmic_glink: Make client-lock non-sleeping")' moved the pmic_glink client list under a spinlock, as it is accessed by the rpmsg/glink callback, which in turn is invoked from IRQ context.

This means that ucsi_unregister() is now called from atomic context, which isn't feasible as it's expecting a sleepable context. An effort is under way to get GLINK to invoke its callbacks in a sleepable context, but until then lets schedule the unregistration.

A side effect of this is that ucsi_unregister() can now happen after the remote processor, and thereby the communication link with it, is gone. pmic_glink_send() is amended with a check to avoid the resulting NULL pointer dereference. This does however result in the user being informed about this error by the following entry in the kernel log:

ucsi_glink.pmic_glink_ucsi pmic_glink.ucsi.0: failed to send UCSI write request: -5

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46691

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3675

Sources (Detail)

https://git.kernel.org/stable/c/095b0001aefddcd9361097c971b7debc84e72714
https://git.kernel.org/stable/c/11bb2ffb679399f99041540cf662409905179e3a
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Date Informations
2025-03-29 03:40:22
  • Multiple Updates
2025-03-28 13:44:49
  • Multiple Updates
2025-03-28 03:18:31
  • Multiple Updates
2025-03-19 03:13:52
  • Multiple Updates
2025-03-18 03:26:48
  • Multiple Updates
2025-03-14 03:14:05
  • Multiple Updates
2025-03-06 14:10:37
  • Multiple Updates
2025-02-22 03:24:10
  • Multiple Updates
2025-01-08 03:05:11
  • Multiple Updates
2025-01-07 03:04:44
  • Multiple Updates
2024-12-25 03:03:22
  • Multiple Updates
2024-12-12 03:06:18
  • Multiple Updates
2024-11-23 03:03:18
  • Multiple Updates
2024-11-22 03:01:28
  • Multiple Updates
2024-11-20 02:59:48
  • Multiple Updates
2024-11-14 03:00:06
  • Multiple Updates
2024-11-09 03:00:06
  • Multiple Updates
2024-10-26 02:57:29
  • Multiple Updates
2024-10-25 02:59:21
  • Multiple Updates
2024-10-23 02:58:33
  • Multiple Updates
2024-10-03 02:53:43
  • Multiple Updates
2024-10-02 02:52:07
  • Multiple Updates
2024-09-15 00:27:26
  • Multiple Updates
2024-09-14 02:47:58
  • Multiple Updates
2024-09-14 02:47:08
  • Multiple Updates
2024-09-13 21:27:34
  • Multiple Updates
2024-09-13 13:27:27
  • First insertion