CVE-2024-49963
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mailbox: bcm2835: Fix timeout during suspend mode<br />
<br />
During noirq suspend phase the Raspberry Pi power driver suffer of<br />
firmware property timeouts. The reason is that the IRQ of the underlying<br />
BCM2835 mailbox is disabled and rpi_firmware_property_list() will always<br />
run into a timeout [1].<br />
<br />
Since the VideoCore side isn&#39;t consider as a wakeup source, set the<br />
IRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled<br />
during suspend-resume cycle.<br />
<br />
[1]<br />
PM: late suspend of devices complete after 1.754 msecs<br />
WARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128<br />
rpi_firmware_property_list+0x204/0x22c<br />
Firmware transaction 0x00028001 timeout<br />
Modules linked in:<br />
CPU: 0 PID: 438 Comm: bash Tainted: G C 6.9.3-dirty #17<br />
Hardware name: BCM2835<br />
Call trace:<br />
unwind_backtrace from show_stack+0x18/0x1c<br />
show_stack from dump_stack_lvl+0x34/0x44<br />
dump_stack_lvl from __warn+0x88/0xec<br />
__warn from warn_slowpath_fmt+0x7c/0xb0<br />
warn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c<br />
rpi_firmware_property_list from rpi_firmware_property+0x68/0x8c<br />
rpi_firmware_property from rpi_firmware_set_power+0x54/0xc0<br />
rpi_firmware_set_power from _genpd_power_off+0xe4/0x148<br />
_genpd_power_off from genpd_sync_power_off+0x7c/0x11c<br />
genpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0<br />
genpd_finish_suspend from dpm_run_callback+0x78/0xd0<br />
dpm_run_callback from device_suspend_noirq+0xc0/0x238<br />
device_suspend_noirq from dpm_suspend_noirq+0xb0/0x168<br />
dpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac<br />
suspend_devices_and_enter from pm_suspend+0x254/0x2e4<br />
pm_suspend from state_store+0xa8/0xd4<br />
state_store from kernfs_fop_write_iter+0x154/0x1a0<br />
kernfs_fop_write_iter from vfs_write+0x12c/0x184<br />
vfs_write from ksys_write+0x78/0xc0<br />
ksys_write from ret_fast_syscall+0x0/0x54<br />
Exception stack(0xcc93dfa8 to 0xcc93dff0)<br />
[...]<br />
PM: noirq suspend of devices complete after 3095.584 msecs
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.2 (including) | 5.10.227 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.55 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/10a58555e0bb5cc4673c8bb73b8afc5fa651f0ac
- https://git.kernel.org/stable/c/32ee78823dea2d54adaf6e05f86622eba359e091
- https://git.kernel.org/stable/c/4e1e03760ee7cc4779b6306867fe0fc02921b963
- https://git.kernel.org/stable/c/90320cfc07b7d6e7a58fd8168f6380ec52ff0251
- https://git.kernel.org/stable/c/b0de20de29b13950493a36bd4cf531200eb0e807
- https://git.kernel.org/stable/c/dc09f007caed3b2f6a3b6bd7e13777557ae22bfd
- https://git.kernel.org/stable/c/df293ea78740a41384d648041f38f645700288e1
- https://git.kernel.org/stable/c/dfeb67b2194ecc55ef8065468c5adda3cdf59114
- https://git.kernel.org/stable/c/e65a9af05a0b59ebeba28e5e82265a233db7bc27
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



