๐Ÿ” CVE Alert

CVE-2024-46692

UNKNOWN 0.0

firmware: qcom: scm: Mark get_wq_ctx() as atomic call

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: scm: Mark get_wq_ctx() as atomic call Currently get_wq_ctx() is wrongly configured as a standard call. When two SMC calls are in sleep and one SMC wakes up, it calls get_wq_ctx() to resume the corresponding sleeping thread. But if get_wq_ctx() is interrupted, goes to sleep and another SMC call is waiting to be allocated a waitq context, it leads to a deadlock. To avoid this get_wq_ctx() must be an atomic call and can't be a standard SMC call. Hence mark get_wq_ctx() as a fast call.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 13, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
6bf32599223634294cdc6efb359ffaab1d68073c < cdf7efe4b02aa93813db0bf1ca596ad298ab6b06 6bf32599223634294cdc6efb359ffaab1d68073c < e40115c33c0d79c940545b6b12112aace7acd9f5 6bf32599223634294cdc6efb359ffaab1d68073c < 9960085a3a82c58d3323c1c20b991db6045063b0
Linux / Linux
6.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/cdf7efe4b02aa93813db0bf1ca596ad298ab6b06 git.kernel.org: https://git.kernel.org/stable/c/e40115c33c0d79c940545b6b12112aace7acd9f5 git.kernel.org: https://git.kernel.org/stable/c/9960085a3a82c58d3323c1c20b991db6045063b0