CVE-2022-48761

In the Linux kernel, the following vulnerability has been resolved: usb: xhci-plat: fix crash when suspend if remote wake enable Crashed at i.mx8qm platform when suspend if enable remote wakeup Internal error: synchronous external abort: 96000210 [#1] PREEMPT SMP Modules linked in: CPU: 2 PID: 244 Comm: kworker/u12:6 Not tainted 5.15.5-dirty #12 Hardware name: Freescale i.MX8QM MEK (DT) Workqueue: events_unbound async_run_entry_fn pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : xhci_disable_hub_port_wake.isra.62+0x60/0xf8 lr : xhci_disable_hub_port_wake.isra.62+0x34/0xf8 sp : ffff80001394bbf0 x29: ffff80001394bbf0 x28: 0000000000000000 x27: ffff00081193b578 x26: ffff00081193b570 x25: 0000000000000000 x24: 0000000000000000 x23: ffff00081193a29c x22: 0000000000020001 x21: 0000000000000001 x20: 0000000000000000 x19: ffff800014e90490 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000002 x12: 0000000000000000 x11: 0000000000000000 x10: 0000000000000960 x9 : ffff80001394baa0 x8 : ffff0008145d1780 x7 : ffff0008f95b8e80 x6 : 000000001853b453 x5 : 0000000000000496 x4 : 0000000000000000 x3 : ffff00081193a29c x2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff000814591620 Call trace: xhci_disable_hub_port_wake.isra.62+0x60/0xf8 xhci_suspend+0x58/0x510 xhci_plat_suspend+0x50/0x78 platform_pm_suspend+0x2c/0x78 dpm_run_callback.isra.25+0x50/0xe8 __device_suspend+0x108/0x3c0 The basic flow: 1. run time suspend call xhci_suspend, xhci parent devices gate the clock. 2. echo mem >/sys/power/state, system _device_suspend call xhci_suspend 3. xhci_suspend call xhci_disable_hub_port_wake, which access register, but clock already gated by run time suspend. This problem was hidden by power domain driver, which call run time resume before it. But the below commit remove it and make this issue happen. commit c1df456d0f06e ("PM: domains: Don't runtime resume devices at genpd_prepare()") This patch call run time resume before suspend to make sure clock is on before access register. Testeb-by: Abel Vesa <abel.vesa@nxp.com>
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*

History

29 Sep 2025, 17:21

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/20c51a4c52208f98e27308c456a1951778f41fa5 - () https://git.kernel.org/stable/c/20c51a4c52208f98e27308c456a1951778f41fa5 - Patch
References () https://git.kernel.org/stable/c/8b05ad29acb972850ad795fa850e814b2e758b83 - () https://git.kernel.org/stable/c/8b05ad29acb972850ad795fa850e814b2e758b83 - Patch
References () https://git.kernel.org/stable/c/9df478463d9feb90dae24f183383961cf123a0ec - () https://git.kernel.org/stable/c/9df478463d9feb90dae24f183383961cf123a0ec - Patch
References () https://git.kernel.org/stable/c/d5755832a1e47f5d8773f0776e211ecd4e02da72 - () https://git.kernel.org/stable/c/d5755832a1e47f5d8773f0776e211ecd4e02da72 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo

21 Nov 2024, 07:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/20c51a4c52208f98e27308c456a1951778f41fa5 - () https://git.kernel.org/stable/c/20c51a4c52208f98e27308c456a1951778f41fa5 -
References () https://git.kernel.org/stable/c/8b05ad29acb972850ad795fa850e814b2e758b83 - () https://git.kernel.org/stable/c/8b05ad29acb972850ad795fa850e814b2e758b83 -
References () https://git.kernel.org/stable/c/9df478463d9feb90dae24f183383961cf123a0ec - () https://git.kernel.org/stable/c/9df478463d9feb90dae24f183383961cf123a0ec -
References () https://git.kernel.org/stable/c/d5755832a1e47f5d8773f0776e211ecd4e02da72 - () https://git.kernel.org/stable/c/d5755832a1e47f5d8773f0776e211ecd4e02da72 -

30 Oct 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: usb: xhci-plat: corrige el bloqueo al suspender si se habilita la activación remota. Falló en la plataforma i.mx8qm al suspender si se habilita la activación remota. Error interno: aborto externo sincrónico: 96000210 [#1] PREEMPT Módulos SMP vinculados en: CPU: 2 PID: 244 Comm: kworker/u12:6 Not tainted 5.15.5-dirty #12 Nombre del hardware: Freescale i.MX8QM MEK (DT) Cola de trabajo: events_unbound async_run_entry_fn pstate: 600000c5 (nZCv daIF - PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: xhci_disable_hub_port_wake.isra.62+0x60/0xf8 lr: xhci_disable_hub_port_wake.isra.62+0x34/0xf8 sp: ffff80001394bbf0 x29: ffff80001394bbf0 x28: 0000000000000000 x27: ffff00081193b578 x26: ffff00081193b570 x25: 0000000000000000 x24: 0000000000000000 x23: ffff00081193a29c x22: 0000000000020001 x21: 0000000000000001 x20: 0000000000000000 x19: ffff800014e90490 x18: 000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000002 x12: 0000000000000000 x11: 0000000000000000 x10: 0000000000000960 x9 : ffff80001394baa0 x8 : ffff0008145d1780 x7 : ffff0008f95b8e80 x6 : 000000001853b453 x5 : 0000000000000496 x4 : 0000000000000000 x3 : ffff000811 93a29c x2: 0000000000000001 x1: 0000000000000000 x0: ffff000814591620 Rastreo de llamadas: xhci_disable_hub_port_wake.isra.62+0x60/0xf8 xhci_suspend+0x58/0x510 0x50/ 0x78 platform_pm_suspend+0x2c/0x78 dpm_run_callback.isra.25+0x50/0xe8 __device_suspend+0x108/0x3c0 El flujo básico: 1. llamada de suspensión en tiempo de ejecución xhci_suspend, los dispositivos principales xhci controlan el reloj. 2. echo mem &gt;/sys/power/state, system _device_suspend llama a xhci_suspend 3. xhci_suspend llama a xhci_disable_hub_port_wake, que accede al registro, pero el reloj ya está cerrado por la suspensión del tiempo de ejecución. Este problema fue ocultado por el controlador de dominio de energía, que solicita la reanudación del tiempo de ejecución antes. Pero el siguiente compromiso lo elimina y hace que este problema suceda. commit c1df456d0f06e ("PM: dominios: no reanudar el tiempo de ejecución de los dispositivos en genpd_prepare()") Este parche llama al tiempo de ejecución para reanudar antes de la suspensión para asegurarse de que el reloj esté encendido antes del registro de acceso. Testeb-by: Abel Vesa

20 Jun 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-20 12:15

Updated : 2025-09-29 17:21


NVD link : CVE-2022-48761

Mitre link : CVE-2022-48761

CVE.ORG link : CVE-2022-48761


JSON object : View

Products Affected

linux

  • linux_kernel