cve-2024-49963
Vulnerability from cvelistv5
Published
2024-10-21 18:02
Modified
2024-12-19 09:30
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: mailbox: bcm2835: Fix timeout during suspend mode During noirq suspend phase the Raspberry Pi power driver suffer of firmware property timeouts. The reason is that the IRQ of the underlying BCM2835 mailbox is disabled and rpi_firmware_property_list() will always run into a timeout [1]. Since the VideoCore side isn't consider as a wakeup source, set the IRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled during suspend-resume cycle. [1] PM: late suspend of devices complete after 1.754 msecs WARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128 rpi_firmware_property_list+0x204/0x22c Firmware transaction 0x00028001 timeout Modules linked in: CPU: 0 PID: 438 Comm: bash Tainted: G C 6.9.3-dirty #17 Hardware name: BCM2835 Call trace: unwind_backtrace from show_stack+0x18/0x1c show_stack from dump_stack_lvl+0x34/0x44 dump_stack_lvl from __warn+0x88/0xec __warn from warn_slowpath_fmt+0x7c/0xb0 warn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c rpi_firmware_property_list from rpi_firmware_property+0x68/0x8c rpi_firmware_property from rpi_firmware_set_power+0x54/0xc0 rpi_firmware_set_power from _genpd_power_off+0xe4/0x148 _genpd_power_off from genpd_sync_power_off+0x7c/0x11c genpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0 genpd_finish_suspend from dpm_run_callback+0x78/0xd0 dpm_run_callback from device_suspend_noirq+0xc0/0x238 device_suspend_noirq from dpm_suspend_noirq+0xb0/0x168 dpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac suspend_devices_and_enter from pm_suspend+0x254/0x2e4 pm_suspend from state_store+0xa8/0xd4 state_store from kernfs_fop_write_iter+0x154/0x1a0 kernfs_fop_write_iter from vfs_write+0x12c/0x184 vfs_write from ksys_write+0x78/0xc0 ksys_write from ret_fast_syscall+0x0/0x54 Exception stack(0xcc93dfa8 to 0xcc93dff0) [...] PM: noirq suspend of devices complete after 3095.584 msecs
Impacted products
Vendor Product Version
Linux Linux Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Create a notification for this product.
   Linux Linux Version: 4.2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-49963",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T13:34:51.005901Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T13:38:47.368Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/mailbox/bcm2835-mailbox.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "4e1e03760ee7cc4779b6306867fe0fc02921b963",
              "status": "affected",
              "version": "0bae6af6d704f026d4938739786e0a69d50177ca",
              "versionType": "git"
            },
            {
              "lessThan": "b0de20de29b13950493a36bd4cf531200eb0e807",
              "status": "affected",
              "version": "0bae6af6d704f026d4938739786e0a69d50177ca",
              "versionType": "git"
            },
            {
              "lessThan": "32ee78823dea2d54adaf6e05f86622eba359e091",
              "status": "affected",
              "version": "0bae6af6d704f026d4938739786e0a69d50177ca",
              "versionType": "git"
            },
            {
              "lessThan": "df293ea78740a41384d648041f38f645700288e1",
              "status": "affected",
              "version": "0bae6af6d704f026d4938739786e0a69d50177ca",
              "versionType": "git"
            },
            {
              "lessThan": "90320cfc07b7d6e7a58fd8168f6380ec52ff0251",
              "status": "affected",
              "version": "0bae6af6d704f026d4938739786e0a69d50177ca",
              "versionType": "git"
            },
            {
              "lessThan": "10a58555e0bb5cc4673c8bb73b8afc5fa651f0ac",
              "status": "affected",
              "version": "0bae6af6d704f026d4938739786e0a69d50177ca",
              "versionType": "git"
            },
            {
              "lessThan": "e65a9af05a0b59ebeba28e5e82265a233db7bc27",
              "status": "affected",
              "version": "0bae6af6d704f026d4938739786e0a69d50177ca",
              "versionType": "git"
            },
            {
              "lessThan": "dfeb67b2194ecc55ef8065468c5adda3cdf59114",
              "status": "affected",
              "version": "0bae6af6d704f026d4938739786e0a69d50177ca",
              "versionType": "git"
            },
            {
              "lessThan": "dc09f007caed3b2f6a3b6bd7e13777557ae22bfd",
              "status": "affected",
              "version": "0bae6af6d704f026d4938739786e0a69d50177ca",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/mailbox/bcm2835-mailbox.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.2"
            },
            {
              "lessThan": "4.2",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.323",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.285",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.227",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.168",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.113",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.55",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.14",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.12",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: bcm2835: Fix timeout during suspend mode\n\nDuring noirq suspend phase the Raspberry Pi power driver suffer of\nfirmware property timeouts. The reason is that the IRQ of the underlying\nBCM2835 mailbox is disabled and rpi_firmware_property_list() will always\nrun into a timeout [1].\n\nSince the VideoCore side isn\u0027t consider as a wakeup source, set the\nIRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled\nduring suspend-resume cycle.\n\n[1]\nPM: late suspend of devices complete after 1.754 msecs\nWARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128\n rpi_firmware_property_list+0x204/0x22c\nFirmware transaction 0x00028001 timeout\nModules linked in:\nCPU: 0 PID: 438 Comm: bash Tainted: G         C         6.9.3-dirty #17\nHardware name: BCM2835\nCall trace:\nunwind_backtrace from show_stack+0x18/0x1c\nshow_stack from dump_stack_lvl+0x34/0x44\ndump_stack_lvl from __warn+0x88/0xec\n__warn from warn_slowpath_fmt+0x7c/0xb0\nwarn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c\nrpi_firmware_property_list from rpi_firmware_property+0x68/0x8c\nrpi_firmware_property from rpi_firmware_set_power+0x54/0xc0\nrpi_firmware_set_power from _genpd_power_off+0xe4/0x148\n_genpd_power_off from genpd_sync_power_off+0x7c/0x11c\ngenpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0\ngenpd_finish_suspend from dpm_run_callback+0x78/0xd0\ndpm_run_callback from device_suspend_noirq+0xc0/0x238\ndevice_suspend_noirq from dpm_suspend_noirq+0xb0/0x168\ndpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac\nsuspend_devices_and_enter from pm_suspend+0x254/0x2e4\npm_suspend from state_store+0xa8/0xd4\nstate_store from kernfs_fop_write_iter+0x154/0x1a0\nkernfs_fop_write_iter from vfs_write+0x12c/0x184\nvfs_write from ksys_write+0x78/0xc0\nksys_write from ret_fast_syscall+0x0/0x54\nException stack(0xcc93dfa8 to 0xcc93dff0)\n[...]\nPM: noirq suspend of devices complete after 3095.584 msecs"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:30:16.246Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/4e1e03760ee7cc4779b6306867fe0fc02921b963"
        },
        {
          "url": "https://git.kernel.org/stable/c/b0de20de29b13950493a36bd4cf531200eb0e807"
        },
        {
          "url": "https://git.kernel.org/stable/c/32ee78823dea2d54adaf6e05f86622eba359e091"
        },
        {
          "url": "https://git.kernel.org/stable/c/df293ea78740a41384d648041f38f645700288e1"
        },
        {
          "url": "https://git.kernel.org/stable/c/90320cfc07b7d6e7a58fd8168f6380ec52ff0251"
        },
        {
          "url": "https://git.kernel.org/stable/c/10a58555e0bb5cc4673c8bb73b8afc5fa651f0ac"
        },
        {
          "url": "https://git.kernel.org/stable/c/e65a9af05a0b59ebeba28e5e82265a233db7bc27"
        },
        {
          "url": "https://git.kernel.org/stable/c/dfeb67b2194ecc55ef8065468c5adda3cdf59114"
        },
        {
          "url": "https://git.kernel.org/stable/c/dc09f007caed3b2f6a3b6bd7e13777557ae22bfd"
        }
      ],
      "title": "mailbox: bcm2835: Fix timeout during suspend mode",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-49963",
    "datePublished": "2024-10-21T18:02:15.091Z",
    "dateReserved": "2024-10-21T12:17:06.049Z",
    "dateUpdated": "2024-12-19T09:30:16.246Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-49963\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T18:15:17.447\",\"lastModified\":\"2024-11-08T16:15:35.830\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmailbox: bcm2835: Fix timeout during suspend mode\\n\\nDuring noirq suspend phase the Raspberry Pi power driver suffer of\\nfirmware property timeouts. The reason is that the IRQ of the underlying\\nBCM2835 mailbox is disabled and rpi_firmware_property_list() will always\\nrun into a timeout [1].\\n\\nSince the VideoCore side isn\u0027t consider as a wakeup source, set the\\nIRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled\\nduring suspend-resume cycle.\\n\\n[1]\\nPM: late suspend of devices complete after 1.754 msecs\\nWARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128\\n rpi_firmware_property_list+0x204/0x22c\\nFirmware transaction 0x00028001 timeout\\nModules linked in:\\nCPU: 0 PID: 438 Comm: bash Tainted: G         C         6.9.3-dirty #17\\nHardware name: BCM2835\\nCall trace:\\nunwind_backtrace from show_stack+0x18/0x1c\\nshow_stack from dump_stack_lvl+0x34/0x44\\ndump_stack_lvl from __warn+0x88/0xec\\n__warn from warn_slowpath_fmt+0x7c/0xb0\\nwarn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c\\nrpi_firmware_property_list from rpi_firmware_property+0x68/0x8c\\nrpi_firmware_property from rpi_firmware_set_power+0x54/0xc0\\nrpi_firmware_set_power from _genpd_power_off+0xe4/0x148\\n_genpd_power_off from genpd_sync_power_off+0x7c/0x11c\\ngenpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0\\ngenpd_finish_suspend from dpm_run_callback+0x78/0xd0\\ndpm_run_callback from device_suspend_noirq+0xc0/0x238\\ndevice_suspend_noirq from dpm_suspend_noirq+0xb0/0x168\\ndpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac\\nsuspend_devices_and_enter from pm_suspend+0x254/0x2e4\\npm_suspend from state_store+0xa8/0xd4\\nstate_store from kernfs_fop_write_iter+0x154/0x1a0\\nkernfs_fop_write_iter from vfs_write+0x12c/0x184\\nvfs_write from ksys_write+0x78/0xc0\\nksys_write from ret_fast_syscall+0x0/0x54\\nException stack(0xcc93dfa8 to 0xcc93dff0)\\n[...]\\nPM: noirq suspend of devices complete after 3095.584 msecs\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mailbox: bcm2835: Fix timeout during suspend mode Durante la fase de suspensi\u00f3n de noirq, el controlador de energ\u00eda de Raspberry Pi sufre tiempos de espera de propiedad de firmware. La raz\u00f3n es que la IRQ del buz\u00f3n BCM2835 subyacente est\u00e1 deshabilitada y rpi_firmware_property_list() siempre se encontrar\u00e1 con un tiempo de espera [1]. Dado que el lado de VideoCore no se considera una fuente de reactivaci\u00f3n, configure el indicador IRQF_NO_SUSPEND para el IRQ del buz\u00f3n para mantenerlo habilitado durante el ciclo de suspensi\u00f3n-reanudaci\u00f3n. [1] PM: suspensi\u00f3n tard\u00eda de dispositivos completada despu\u00e9s de 1,754 msegs ADVERTENCIA: CPU: 0 PID: 438 en drivers/firmware/raspberrypi.c:128 rpi_firmware_property_list+0x204/0x22c Tiempo de espera de transacci\u00f3n de firmware 0x00028001 M\u00f3dulos vinculados: CPU: 0 PID: 438 Comm: bash Tainted: GC 6.9.3-dirty #17 Nombre del hardware: BCM2835 Rastreo de llamadas: unwind_backtrace de show_stack+0x18/0x1c show_stack de dump_stack_lvl+0x34/0x44 dump_stack_lvl de __warn+0x88/0xec __warn de warn_slowpath_fmt+0x7c/0xb0 warn_slowpath_fmt de rpi_firmware_property_list+0x204/0x22c rpi_firmware_property_list de rpi_firmware_property+0x68/0x8c rpi_firmware_property de rpi_firmware_set_power+0x54/0xc0 rpi_firmware_set_power de _genpd_power_off+0xe4/0x148 _genpd_power_off de genpd_sync_power_off+0x7c/0x11c genpd_sync_power_off de genpd_finish_suspend+0xcc/0xe0 genpd_finish_suspend de dpm_run_callback+0x78/0xd0 dpm_run_callback de device_suspend_noirq+0xc0/0x238 device_suspend_noirq de dpm_suspend_noirq+0xb0/0x168 dpm_suspend_noirq desde suspend_devices_and_enter+0x1b8/0x5ac suspend_devices_and_enter desde pm_suspend+0x254/0x2e4 pm_suspend desde state_store+0xa8/0xd4 state_store desde kernfs_fop_write_iter+0x154/0x1a0 kernfs_fop_write_iter desde vfs_write+0x12c/0x184 vfs_write desde ksys_write+0x78/0xc0 ksys_write desde ret_fast_syscall+0x0/0x54 Pila de excepciones (0xcc93dfa8 a 0xcc93dff0) [...] PM: suspensi\u00f3n noirq de dispositivos completada despu\u00e9s de 3095,584 mseg\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2\",\"versionEndExcluding\":\"5.10.227\",\"matchCriteriaId\":\"8A07E653-16C3-4150-BD19-62B6DF148F6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"4D51C05D-455B-4D8D-89E7-A58E140B864C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.55\",\"matchCriteriaId\":\"E90B9576-56C4-47BC-AAB0-C5B2D438F5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.14\",\"matchCriteriaId\":\"4C16BCE0-FFA0-4599-BE0A-1FD65101C021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.3\",\"matchCriteriaId\":\"54D9C704-D679-41A7-9C40-10A6B1E7FFE9\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/10a58555e0bb5cc4673c8bb73b8afc5fa651f0ac\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/32ee78823dea2d54adaf6e05f86622eba359e091\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4e1e03760ee7cc4779b6306867fe0fc02921b963\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/90320cfc07b7d6e7a58fd8168f6380ec52ff0251\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b0de20de29b13950493a36bd4cf531200eb0e807\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dc09f007caed3b2f6a3b6bd7e13777557ae22bfd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/df293ea78740a41384d648041f38f645700288e1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/dfeb67b2194ecc55ef8065468c5adda3cdf59114\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e65a9af05a0b59ebeba28e5e82265a233db7bc27\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-49963\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-22T13:34:51.005901Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-22T13:34:54.432Z\"}}], \"cna\": {\"title\": \"mailbox: bcm2835: Fix timeout during suspend mode\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"32ee78823dea\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"df293ea78740\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"90320cfc07b7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"10a58555e0bb\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"e65a9af05a0b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"dfeb67b2194e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"dc09f007caed\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/mailbox/bcm2835-mailbox.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.2\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.2\", \"versionType\": \"custom\"}, {\"status\": \"unaffected\", \"version\": \"5.10.227\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.55\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.14\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.3\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12-rc1\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/mailbox/bcm2835-mailbox.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/32ee78823dea2d54adaf6e05f86622eba359e091\"}, {\"url\": \"https://git.kernel.org/stable/c/df293ea78740a41384d648041f38f645700288e1\"}, {\"url\": \"https://git.kernel.org/stable/c/90320cfc07b7d6e7a58fd8168f6380ec52ff0251\"}, {\"url\": \"https://git.kernel.org/stable/c/10a58555e0bb5cc4673c8bb73b8afc5fa651f0ac\"}, {\"url\": \"https://git.kernel.org/stable/c/e65a9af05a0b59ebeba28e5e82265a233db7bc27\"}, {\"url\": \"https://git.kernel.org/stable/c/dfeb67b2194ecc55ef8065468c5adda3cdf59114\"}, {\"url\": \"https://git.kernel.org/stable/c/dc09f007caed3b2f6a3b6bd7e13777557ae22bfd\"}], \"x_generator\": {\"engine\": \"bippy-c9c4e1df01b2\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmailbox: bcm2835: Fix timeout during suspend mode\\n\\nDuring noirq suspend phase the Raspberry Pi power driver suffer of\\nfirmware property timeouts. The reason is that the IRQ of the underlying\\nBCM2835 mailbox is disabled and rpi_firmware_property_list() will always\\nrun into a timeout [1].\\n\\nSince the VideoCore side isn\u0027t consider as a wakeup source, set the\\nIRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled\\nduring suspend-resume cycle.\\n\\n[1]\\nPM: late suspend of devices complete after 1.754 msecs\\nWARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128\\n rpi_firmware_property_list+0x204/0x22c\\nFirmware transaction 0x00028001 timeout\\nModules linked in:\\nCPU: 0 PID: 438 Comm: bash Tainted: G         C         6.9.3-dirty #17\\nHardware name: BCM2835\\nCall trace:\\nunwind_backtrace from show_stack+0x18/0x1c\\nshow_stack from dump_stack_lvl+0x34/0x44\\ndump_stack_lvl from __warn+0x88/0xec\\n__warn from warn_slowpath_fmt+0x7c/0xb0\\nwarn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c\\nrpi_firmware_property_list from rpi_firmware_property+0x68/0x8c\\nrpi_firmware_property from rpi_firmware_set_power+0x54/0xc0\\nrpi_firmware_set_power from _genpd_power_off+0xe4/0x148\\n_genpd_power_off from genpd_sync_power_off+0x7c/0x11c\\ngenpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0\\ngenpd_finish_suspend from dpm_run_callback+0x78/0xd0\\ndpm_run_callback from device_suspend_noirq+0xc0/0x238\\ndevice_suspend_noirq from dpm_suspend_noirq+0xb0/0x168\\ndpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac\\nsuspend_devices_and_enter from pm_suspend+0x254/0x2e4\\npm_suspend from state_store+0xa8/0xd4\\nstate_store from kernfs_fop_write_iter+0x154/0x1a0\\nkernfs_fop_write_iter from vfs_write+0x12c/0x184\\nvfs_write from ksys_write+0x78/0xc0\\nksys_write from ret_fast_syscall+0x0/0x54\\nException stack(0xcc93dfa8 to 0xcc93dff0)\\n[...]\\nPM: noirq suspend of devices complete after 3095.584 msecs\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-10-21T18:02:15.091Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-49963\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-22T13:38:47.368Z\", \"dateReserved\": \"2024-10-21T12:17:06.049Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T18:02:15.091Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.