CVE-2024-50057
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
24/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: typec: tipd: Free IRQ only if it was requested before<br />
<br />
In polling mode, if no IRQ was requested there is no need to free it.<br />
Call devm_free_irq() only if client->irq is set. This fixes the warning<br />
caused by the tps6598x module removal:<br />
<br />
WARNING: CPU: 2 PID: 333 at kernel/irq/devres.c:144 devm_free_irq+0x80/0x8c<br />
...<br />
...<br />
Call trace:<br />
devm_free_irq+0x80/0x8c<br />
tps6598x_remove+0x28/0x88 [tps6598x]<br />
i2c_device_remove+0x2c/0x9c<br />
device_remove+0x4c/0x80<br />
device_release_driver_internal+0x1cc/0x228<br />
driver_detach+0x50/0x98<br />
bus_remove_driver+0x6c/0xbc<br />
driver_unregister+0x30/0x60<br />
i2c_del_driver+0x54/0x64<br />
tps6598x_i2c_driver_exit+0x18/0xc3c [tps6598x]<br />
__arm64_sys_delete_module+0x184/0x264<br />
invoke_syscall+0x48/0x110<br />
el0_svc_common.constprop.0+0xc8/0xe8<br />
do_el0_svc+0x20/0x2c<br />
el0_svc+0x28/0x98<br />
el0t_64_sync_handler+0x13c/0x158<br />
el0t_64_sync+0x190/0x194
Impact
Base Score 3.x
3.30
Severity 3.x
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.57 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



