cve-2024-49963
Vulnerability from cvelistv5
Published
2024-10-21 18:02
Modified
2024-12-19 09:30
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: mailbox: bcm2835: Fix timeout during suspend mode During noirq suspend phase the Raspberry Pi power driver suffer of firmware property timeouts. The reason is that the IRQ of the underlying BCM2835 mailbox is disabled and rpi_firmware_property_list() will always run into a timeout [1]. Since the VideoCore side isn't consider as a wakeup source, set the IRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled during suspend-resume cycle. [1] PM: late suspend of devices complete after 1.754 msecs WARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128 rpi_firmware_property_list+0x204/0x22c Firmware transaction 0x00028001 timeout Modules linked in: CPU: 0 PID: 438 Comm: bash Tainted: G C 6.9.3-dirty #17 Hardware name: BCM2835 Call trace: unwind_backtrace from show_stack+0x18/0x1c show_stack from dump_stack_lvl+0x34/0x44 dump_stack_lvl from __warn+0x88/0xec __warn from warn_slowpath_fmt+0x7c/0xb0 warn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c rpi_firmware_property_list from rpi_firmware_property+0x68/0x8c rpi_firmware_property from rpi_firmware_set_power+0x54/0xc0 rpi_firmware_set_power from _genpd_power_off+0xe4/0x148 _genpd_power_off from genpd_sync_power_off+0x7c/0x11c genpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0 genpd_finish_suspend from dpm_run_callback+0x78/0xd0 dpm_run_callback from device_suspend_noirq+0xc0/0x238 device_suspend_noirq from dpm_suspend_noirq+0xb0/0x168 dpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac suspend_devices_and_enter from pm_suspend+0x254/0x2e4 pm_suspend from state_store+0xa8/0xd4 state_store from kernfs_fop_write_iter+0x154/0x1a0 kernfs_fop_write_iter from vfs_write+0x12c/0x184 vfs_write from ksys_write+0x78/0xc0 ksys_write from ret_fast_syscall+0x0/0x54 Exception stack(0xcc93dfa8 to 0xcc93dff0) [...] PM: noirq suspend of devices complete after 3095.584 msecs
Impacted products
Vendor Product Version
Linux Linux Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Version: 0bae6af6d704f026d4938739786e0a69d50177ca
Create a notification for this product.
   Linux Linux Version: 4.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-49963",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-22T13:34:51.005901Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-22T13:38:47.368Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "drivers/mailbox/bcm2835-mailbox.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "4e1e03760ee7cc4779b6306867fe0fc02921b963",
                     status: "affected",
                     version: "0bae6af6d704f026d4938739786e0a69d50177ca",
                     versionType: "git",
                  },
                  {
                     lessThan: "b0de20de29b13950493a36bd4cf531200eb0e807",
                     status: "affected",
                     version: "0bae6af6d704f026d4938739786e0a69d50177ca",
                     versionType: "git",
                  },
                  {
                     lessThan: "32ee78823dea2d54adaf6e05f86622eba359e091",
                     status: "affected",
                     version: "0bae6af6d704f026d4938739786e0a69d50177ca",
                     versionType: "git",
                  },
                  {
                     lessThan: "df293ea78740a41384d648041f38f645700288e1",
                     status: "affected",
                     version: "0bae6af6d704f026d4938739786e0a69d50177ca",
                     versionType: "git",
                  },
                  {
                     lessThan: "90320cfc07b7d6e7a58fd8168f6380ec52ff0251",
                     status: "affected",
                     version: "0bae6af6d704f026d4938739786e0a69d50177ca",
                     versionType: "git",
                  },
                  {
                     lessThan: "10a58555e0bb5cc4673c8bb73b8afc5fa651f0ac",
                     status: "affected",
                     version: "0bae6af6d704f026d4938739786e0a69d50177ca",
                     versionType: "git",
                  },
                  {
                     lessThan: "e65a9af05a0b59ebeba28e5e82265a233db7bc27",
                     status: "affected",
                     version: "0bae6af6d704f026d4938739786e0a69d50177ca",
                     versionType: "git",
                  },
                  {
                     lessThan: "dfeb67b2194ecc55ef8065468c5adda3cdf59114",
                     status: "affected",
                     version: "0bae6af6d704f026d4938739786e0a69d50177ca",
                     versionType: "git",
                  },
                  {
                     lessThan: "dc09f007caed3b2f6a3b6bd7e13777557ae22bfd",
                     status: "affected",
                     version: "0bae6af6d704f026d4938739786e0a69d50177ca",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "drivers/mailbox/bcm2835-mailbox.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "4.2",
                  },
                  {
                     lessThan: "4.2",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "4.19.*",
                     status: "unaffected",
                     version: "4.19.323",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.4.*",
                     status: "unaffected",
                     version: "5.4.285",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.10.*",
                     status: "unaffected",
                     version: "5.10.227",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.15.*",
                     status: "unaffected",
                     version: "5.15.168",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.113",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.55",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.10.*",
                     status: "unaffected",
                     version: "6.10.14",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.11.*",
                     status: "unaffected",
                     version: "6.11.3",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.12",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: bcm2835: Fix timeout during suspend mode\n\nDuring noirq suspend phase the Raspberry Pi power driver suffer of\nfirmware property timeouts. The reason is that the IRQ of the underlying\nBCM2835 mailbox is disabled and rpi_firmware_property_list() will always\nrun into a timeout [1].\n\nSince the VideoCore side isn't consider as a wakeup source, set the\nIRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled\nduring suspend-resume cycle.\n\n[1]\nPM: late suspend of devices complete after 1.754 msecs\nWARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128\n rpi_firmware_property_list+0x204/0x22c\nFirmware transaction 0x00028001 timeout\nModules linked in:\nCPU: 0 PID: 438 Comm: bash Tainted: G         C         6.9.3-dirty #17\nHardware name: BCM2835\nCall trace:\nunwind_backtrace from show_stack+0x18/0x1c\nshow_stack from dump_stack_lvl+0x34/0x44\ndump_stack_lvl from __warn+0x88/0xec\n__warn from warn_slowpath_fmt+0x7c/0xb0\nwarn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c\nrpi_firmware_property_list from rpi_firmware_property+0x68/0x8c\nrpi_firmware_property from rpi_firmware_set_power+0x54/0xc0\nrpi_firmware_set_power from _genpd_power_off+0xe4/0x148\n_genpd_power_off from genpd_sync_power_off+0x7c/0x11c\ngenpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0\ngenpd_finish_suspend from dpm_run_callback+0x78/0xd0\ndpm_run_callback from device_suspend_noirq+0xc0/0x238\ndevice_suspend_noirq from dpm_suspend_noirq+0xb0/0x168\ndpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac\nsuspend_devices_and_enter from pm_suspend+0x254/0x2e4\npm_suspend from state_store+0xa8/0xd4\nstate_store from kernfs_fop_write_iter+0x154/0x1a0\nkernfs_fop_write_iter from vfs_write+0x12c/0x184\nvfs_write from ksys_write+0x78/0xc0\nksys_write from ret_fast_syscall+0x0/0x54\nException stack(0xcc93dfa8 to 0xcc93dff0)\n[...]\nPM: noirq suspend of devices complete after 3095.584 msecs",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T09:30:16.246Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/4e1e03760ee7cc4779b6306867fe0fc02921b963",
            },
            {
               url: "https://git.kernel.org/stable/c/b0de20de29b13950493a36bd4cf531200eb0e807",
            },
            {
               url: "https://git.kernel.org/stable/c/32ee78823dea2d54adaf6e05f86622eba359e091",
            },
            {
               url: "https://git.kernel.org/stable/c/df293ea78740a41384d648041f38f645700288e1",
            },
            {
               url: "https://git.kernel.org/stable/c/90320cfc07b7d6e7a58fd8168f6380ec52ff0251",
            },
            {
               url: "https://git.kernel.org/stable/c/10a58555e0bb5cc4673c8bb73b8afc5fa651f0ac",
            },
            {
               url: "https://git.kernel.org/stable/c/e65a9af05a0b59ebeba28e5e82265a233db7bc27",
            },
            {
               url: "https://git.kernel.org/stable/c/dfeb67b2194ecc55ef8065468c5adda3cdf59114",
            },
            {
               url: "https://git.kernel.org/stable/c/dc09f007caed3b2f6a3b6bd7e13777557ae22bfd",
            },
         ],
         title: "mailbox: bcm2835: Fix timeout during suspend mode",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-49963",
      datePublished: "2024-10-21T18:02:15.091Z",
      dateReserved: "2024-10-21T12:17:06.049Z",
      dateUpdated: "2024-12-19T09:30:16.246Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-49963\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T18:15:17.447\",\"lastModified\":\"2024-11-08T16:15:35.830\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmailbox: bcm2835: Fix timeout during suspend mode\\n\\nDuring noirq suspend phase the Raspberry Pi power driver suffer of\\nfirmware property timeouts. The reason is that the IRQ of the underlying\\nBCM2835 mailbox is disabled and rpi_firmware_property_list() will always\\nrun into a timeout [1].\\n\\nSince the VideoCore side isn't consider as a wakeup source, set the\\nIRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled\\nduring suspend-resume cycle.\\n\\n[1]\\nPM: late suspend of devices complete after 1.754 msecs\\nWARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128\\n rpi_firmware_property_list+0x204/0x22c\\nFirmware transaction 0x00028001 timeout\\nModules linked in:\\nCPU: 0 PID: 438 Comm: bash Tainted: G         C         6.9.3-dirty #17\\nHardware name: BCM2835\\nCall trace:\\nunwind_backtrace from show_stack+0x18/0x1c\\nshow_stack from dump_stack_lvl+0x34/0x44\\ndump_stack_lvl from __warn+0x88/0xec\\n__warn from warn_slowpath_fmt+0x7c/0xb0\\nwarn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c\\nrpi_firmware_property_list from rpi_firmware_property+0x68/0x8c\\nrpi_firmware_property from rpi_firmware_set_power+0x54/0xc0\\nrpi_firmware_set_power from _genpd_power_off+0xe4/0x148\\n_genpd_power_off from genpd_sync_power_off+0x7c/0x11c\\ngenpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0\\ngenpd_finish_suspend from dpm_run_callback+0x78/0xd0\\ndpm_run_callback from device_suspend_noirq+0xc0/0x238\\ndevice_suspend_noirq from dpm_suspend_noirq+0xb0/0x168\\ndpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac\\nsuspend_devices_and_enter from pm_suspend+0x254/0x2e4\\npm_suspend from state_store+0xa8/0xd4\\nstate_store from kernfs_fop_write_iter+0x154/0x1a0\\nkernfs_fop_write_iter from vfs_write+0x12c/0x184\\nvfs_write from ksys_write+0x78/0xc0\\nksys_write from ret_fast_syscall+0x0/0x54\\nException stack(0xcc93dfa8 to 0xcc93dff0)\\n[...]\\nPM: noirq suspend of devices complete after 3095.584 msecs\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mailbox: bcm2835: Fix timeout during suspend mode Durante la fase de suspensión de noirq, el controlador de energía de Raspberry Pi sufre tiempos de espera de propiedad de firmware. La razón es que la IRQ del buzón BCM2835 subyacente está deshabilitada y rpi_firmware_property_list() siempre se encontrará con un tiempo de espera [1]. Dado que el lado de VideoCore no se considera una fuente de reactivación, configure el indicador IRQF_NO_SUSPEND para el IRQ del buzón para mantenerlo habilitado durante el ciclo de suspensión-reanudación. [1] PM: suspensión tardía de dispositivos completada después de 1,754 msegs ADVERTENCIA: CPU: 0 PID: 438 en drivers/firmware/raspberrypi.c:128 rpi_firmware_property_list+0x204/0x22c Tiempo de espera de transacción de firmware 0x00028001 Módulos vinculados: CPU: 0 PID: 438 Comm: bash Tainted: GC 6.9.3-dirty #17 Nombre del hardware: BCM2835 Rastreo de llamadas: unwind_backtrace de show_stack+0x18/0x1c show_stack de dump_stack_lvl+0x34/0x44 dump_stack_lvl de __warn+0x88/0xec __warn de warn_slowpath_fmt+0x7c/0xb0 warn_slowpath_fmt de rpi_firmware_property_list+0x204/0x22c rpi_firmware_property_list de rpi_firmware_property+0x68/0x8c rpi_firmware_property de rpi_firmware_set_power+0x54/0xc0 rpi_firmware_set_power de _genpd_power_off+0xe4/0x148 _genpd_power_off de genpd_sync_power_off+0x7c/0x11c genpd_sync_power_off de genpd_finish_suspend+0xcc/0xe0 genpd_finish_suspend de dpm_run_callback+0x78/0xd0 dpm_run_callback de device_suspend_noirq+0xc0/0x238 device_suspend_noirq de dpm_suspend_noirq+0xb0/0x168 dpm_suspend_noirq desde suspend_devices_and_enter+0x1b8/0x5ac suspend_devices_and_enter desde pm_suspend+0x254/0x2e4 pm_suspend desde state_store+0xa8/0xd4 state_store desde kernfs_fop_write_iter+0x154/0x1a0 kernfs_fop_write_iter desde vfs_write+0x12c/0x184 vfs_write desde ksys_write+0x78/0xc0 ksys_write desde ret_fast_syscall+0x0/0x54 Pila de excepciones (0xcc93dfa8 a 0xcc93dff0) [...] PM: suspensión noirq de dispositivos completada después de 3095,584 mseg\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2\",\"versionEndExcluding\":\"5.10.227\",\"matchCriteriaId\":\"8A07E653-16C3-4150-BD19-62B6DF148F6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"4D51C05D-455B-4D8D-89E7-A58E140B864C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.55\",\"matchCriteriaId\":\"E90B9576-56C4-47BC-AAB0-C5B2D438F5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.14\",\"matchCriteriaId\":\"4C16BCE0-FFA0-4599-BE0A-1FD65101C021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.3\",\"matchCriteriaId\":\"54D9C704-D679-41A7-9C40-10A6B1E7FFE9\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/10a58555e0bb5cc4673c8bb73b8afc5fa651f0ac\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/32ee78823dea2d54adaf6e05f86622eba359e091\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4e1e03760ee7cc4779b6306867fe0fc02921b963\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/90320cfc07b7d6e7a58fd8168f6380ec52ff0251\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b0de20de29b13950493a36bd4cf531200eb0e807\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dc09f007caed3b2f6a3b6bd7e13777557ae22bfd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/df293ea78740a41384d648041f38f645700288e1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/dfeb67b2194ecc55ef8065468c5adda3cdf59114\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e65a9af05a0b59ebeba28e5e82265a233db7bc27\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-49963\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-22T13:34:51.005901Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-22T13:34:54.432Z\"}}], \"cna\": {\"title\": \"mailbox: bcm2835: Fix timeout during suspend mode\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"32ee78823dea\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"df293ea78740\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"90320cfc07b7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"10a58555e0bb\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"e65a9af05a0b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"dfeb67b2194e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bae6af6d704\", \"lessThan\": \"dc09f007caed\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/mailbox/bcm2835-mailbox.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.2\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.2\", \"versionType\": \"custom\"}, {\"status\": \"unaffected\", \"version\": \"5.10.227\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.55\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.14\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.3\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12-rc1\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/mailbox/bcm2835-mailbox.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/32ee78823dea2d54adaf6e05f86622eba359e091\"}, {\"url\": \"https://git.kernel.org/stable/c/df293ea78740a41384d648041f38f645700288e1\"}, {\"url\": \"https://git.kernel.org/stable/c/90320cfc07b7d6e7a58fd8168f6380ec52ff0251\"}, {\"url\": \"https://git.kernel.org/stable/c/10a58555e0bb5cc4673c8bb73b8afc5fa651f0ac\"}, {\"url\": \"https://git.kernel.org/stable/c/e65a9af05a0b59ebeba28e5e82265a233db7bc27\"}, {\"url\": \"https://git.kernel.org/stable/c/dfeb67b2194ecc55ef8065468c5adda3cdf59114\"}, {\"url\": \"https://git.kernel.org/stable/c/dc09f007caed3b2f6a3b6bd7e13777557ae22bfd\"}], \"x_generator\": {\"engine\": \"bippy-c9c4e1df01b2\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmailbox: bcm2835: Fix timeout during suspend mode\\n\\nDuring noirq suspend phase the Raspberry Pi power driver suffer of\\nfirmware property timeouts. The reason is that the IRQ of the underlying\\nBCM2835 mailbox is disabled and rpi_firmware_property_list() will always\\nrun into a timeout [1].\\n\\nSince the VideoCore side isn't consider as a wakeup source, set the\\nIRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled\\nduring suspend-resume cycle.\\n\\n[1]\\nPM: late suspend of devices complete after 1.754 msecs\\nWARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128\\n rpi_firmware_property_list+0x204/0x22c\\nFirmware transaction 0x00028001 timeout\\nModules linked in:\\nCPU: 0 PID: 438 Comm: bash Tainted: G         C         6.9.3-dirty #17\\nHardware name: BCM2835\\nCall trace:\\nunwind_backtrace from show_stack+0x18/0x1c\\nshow_stack from dump_stack_lvl+0x34/0x44\\ndump_stack_lvl from __warn+0x88/0xec\\n__warn from warn_slowpath_fmt+0x7c/0xb0\\nwarn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c\\nrpi_firmware_property_list from rpi_firmware_property+0x68/0x8c\\nrpi_firmware_property from rpi_firmware_set_power+0x54/0xc0\\nrpi_firmware_set_power from _genpd_power_off+0xe4/0x148\\n_genpd_power_off from genpd_sync_power_off+0x7c/0x11c\\ngenpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0\\ngenpd_finish_suspend from dpm_run_callback+0x78/0xd0\\ndpm_run_callback from device_suspend_noirq+0xc0/0x238\\ndevice_suspend_noirq from dpm_suspend_noirq+0xb0/0x168\\ndpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac\\nsuspend_devices_and_enter from pm_suspend+0x254/0x2e4\\npm_suspend from state_store+0xa8/0xd4\\nstate_store from kernfs_fop_write_iter+0x154/0x1a0\\nkernfs_fop_write_iter from vfs_write+0x12c/0x184\\nvfs_write from ksys_write+0x78/0xc0\\nksys_write from ret_fast_syscall+0x0/0x54\\nException stack(0xcc93dfa8 to 0xcc93dff0)\\n[...]\\nPM: noirq suspend of devices complete after 3095.584 msecs\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-10-21T18:02:15.091Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-49963\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-22T13:38:47.368Z\", \"dateReserved\": \"2024-10-21T12:17:06.049Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T18:02:15.091Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.