CVE-2024-46846
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/09/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
spi: rockchip: Resolve unbalanced runtime PM / system PM handling<br />
<br />
Commit e882575efc77 ("spi: rockchip: Suspend and resume the bus during<br />
NOIRQ_SYSTEM_SLEEP_PM ops") stopped respecting runtime PM status and<br />
simply disabled clocks unconditionally when suspending the system. This<br />
causes problems when the device is already runtime suspended when we go<br />
to sleep -- in which case we double-disable clocks and produce a<br />
WARNing.<br />
<br />
Switch back to pm_runtime_force_{suspend,resume}(), because that still<br />
seems like the right thing to do, and the aforementioned commit makes no<br />
explanation why it stopped using it.<br />
<br />
Also, refactor some of the resume() error handling, because it&#39;s not<br />
actually a good idea to re-disable clocks on failure.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 6.1.110 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.51 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0efbad8445fbba7896402500a1473450a299a08a
- https://git.kernel.org/stable/c/14f970a8d03d882b15b97beb83bd84ac8ba6298c
- https://git.kernel.org/stable/c/be721b451affbecc4ba4eaac3b71cdbdcade1b1b
- https://git.kernel.org/stable/c/d034bff62faea1a2219e0d2f3d17263265f24087
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



