CVE-2024-50093
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/11/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
thermal: intel: int340x: processor: Fix warning during module unload<br />
<br />
The processor_thermal driver uses pcim_device_enable() to enable a PCI<br />
device, which means the device will be automatically disabled on driver<br />
detach. Thus there is no need to call pci_disable_device() again on it.<br />
<br />
With recent PCI device resource management improvements, e.g. commit<br />
f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is<br />
exposed and triggers the warining below.<br />
<br />
[ 224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device<br />
[ 224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100<br />
...<br />
[ 224.010844] Call Trace:<br />
[ 224.010845] <br />
[ 224.010847] ? show_regs+0x6d/0x80<br />
[ 224.010851] ? __warn+0x8c/0x140<br />
[ 224.010854] ? pci_disable_device+0xe5/0x100<br />
[ 224.010856] ? report_bug+0x1c9/0x1e0<br />
[ 224.010859] ? handle_bug+0x46/0x80<br />
[ 224.010862] ? exc_invalid_op+0x1d/0x80<br />
[ 224.010863] ? asm_exc_invalid_op+0x1f/0x30<br />
[ 224.010867] ? pci_disable_device+0xe5/0x100<br />
[ 224.010869] ? pci_disable_device+0xe5/0x100<br />
[ 224.010871] ? kfree+0x21a/0x2b0<br />
[ 224.010873] pcim_disable_device+0x20/0x30<br />
[ 224.010875] devm_action_release+0x16/0x20<br />
[ 224.010878] release_nodes+0x47/0xc0<br />
[ 224.010880] devres_release_all+0x9f/0xe0<br />
[ 224.010883] device_unbind_cleanup+0x12/0x80<br />
[ 224.010885] device_release_driver_internal+0x1ca/0x210<br />
[ 224.010887] driver_detach+0x4e/0xa0<br />
[ 224.010889] bus_remove_driver+0x6f/0xf0<br />
[ 224.010890] driver_unregister+0x35/0x60<br />
[ 224.010892] pci_unregister_driver+0x44/0x90<br />
[ 224.010894] proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci]<br />
...<br />
[ 224.010921] ---[ end trace 0000000000000000 ]---<br />
<br />
Remove the excess pci_disable_device() calls.<br />
<br />
[ rjw: Subject and changelog edits ]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 5.15.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.57 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/434525a864136c928b54fd2512b4c0167c207463
- https://git.kernel.org/stable/c/8403021b6f32d68a7e3a6b8428ecaf5c153a9974
- https://git.kernel.org/stable/c/99ca0b57e49fb73624eede1c4396d9e3d10ccf14
- https://git.kernel.org/stable/c/b4ab78f4adeaf6c98be5d375518dd4fb666eac5e
- https://git.kernel.org/stable/c/dd64ea03375618684477f946be4f5e253f8676c2
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



