Bug 2320601 (CVE-2024-50057) - CVE-2024-50057 kernel: usb: typec: tipd: Free IRQ only if it was requested before
Summary: CVE-2024-50057 kernel: usb: typec: tipd: Free IRQ only if it was requested be...
Keywords:
Status: NEW
Alias: CVE-2024-50057
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2320919
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-10-21 20:02 UTC by OSIDB Bzimport
Modified: 2025-05-13 08:31 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:6966 0 None None None 2025-05-13 08:31:08 UTC

Description OSIDB Bzimport 2024-10-21 20:02:35 UTC
In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tipd: Free IRQ only if it was requested before

In polling mode, if no IRQ was requested there is no need to free it.
Call devm_free_irq() only if client->irq is set. This fixes the warning
caused by the tps6598x module removal:

WARNING: CPU: 2 PID: 333 at kernel/irq/devres.c:144 devm_free_irq+0x80/0x8c
...
...
Call trace:
  devm_free_irq+0x80/0x8c
  tps6598x_remove+0x28/0x88 [tps6598x]
  i2c_device_remove+0x2c/0x9c
  device_remove+0x4c/0x80
  device_release_driver_internal+0x1cc/0x228
  driver_detach+0x50/0x98
  bus_remove_driver+0x6c/0xbc
  driver_unregister+0x30/0x60
  i2c_del_driver+0x54/0x64
  tps6598x_i2c_driver_exit+0x18/0xc3c [tps6598x]
  __arm64_sys_delete_module+0x184/0x264
  invoke_syscall+0x48/0x110
  el0_svc_common.constprop.0+0xc8/0xe8
  do_el0_svc+0x20/0x2c
  el0_svc+0x28/0x98
  el0t_64_sync_handler+0x13c/0x158
  el0t_64_sync+0x190/0x194

Comment 1 Avinash Hanwate 2024-10-22 11:05:23 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50057-d046@gregkh/T

Comment 2 Rohit Keshri 2024-12-16 12:26:08 UTC
This issue does not seems to be a security flaw.

Comment 3 errata-xmlrpc 2025-05-13 08:31:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:6966 https://access.redhat.com/errata/RHSA-2025:6966


Note You need to log in before you can comment on or make changes to this bug.