3.3
CWE
763
Advisory Published
Updated

CVE-2024-50057: usb: typec: tipd: Free IRQ only if it was requested before

First published: Mon Oct 21 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Free IRQ only if it was requested before In polling mode, if no IRQ was requested there is no need to free it. Call devm_free_irq() only if client->irq is set. This fixes the warning caused by the tps6598x module removal: WARNING: CPU: 2 PID: 333 at kernel/irq/devres.c:144 devm_free_irq+0x80/0x8c ... ... Call trace: devm_free_irq+0x80/0x8c tps6598x_remove+0x28/0x88 [tps6598x] i2c_device_remove+0x2c/0x9c device_remove+0x4c/0x80 device_release_driver_internal+0x1cc/0x228 driver_detach+0x50/0x98 bus_remove_driver+0x6c/0xbc driver_unregister+0x30/0x60 i2c_del_driver+0x54/0x64 tps6598x_i2c_driver_exit+0x18/0xc3c [tps6598x] __arm64_sys_delete_module+0x184/0x264 invoke_syscall+0x48/0x110 el0_svc_common.constprop.0+0xc8/0xe8 do_el0_svc+0x20/0x2c el0_svc+0x28/0x98 el0t_64_sync_handler+0x13c/0x158 el0t_64_sync+0x190/0x194

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Linux Kernel<6.6.57
Linux Kernel>=6.7<6.11.4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-50057?

    The severity of CVE-2024-50057 is classified as low due to its limited impact.

  • How does CVE-2024-50057 affect the Linux kernel?

    CVE-2024-50057 affects the Linux kernel by causing warnings when freeing IRQs that were not requested in polling mode.

  • How do I fix CVE-2024-50057?

    To fix CVE-2024-50057, ensure you update to a patched version of the Linux kernel that resolves this issue.

  • Which versions of the Linux kernel are affected by CVE-2024-50057?

    CVE-2024-50057 affects Linux kernel versions between 6.7 and 6.11.4, as well as versions up to 6.6.57.

  • What changes were made in the fix for CVE-2024-50057?

    The fix for CVE-2024-50057 includes updating the code to call devm_free_irq() only if client->irq is set.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203