Skip to main content

CVE-2024-46689: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-46689cvecve-2024-46689
Published: Fri Sep 13 2024 (09/13/2024, 05:29:19 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: soc: qcom: cmd-db: Map shared memory as WC, not WB Linux does not write into cmd-db region. This region of memory is write protected by XPU. XPU may sometime falsely detect clean cache eviction as "write" into the write protected region leading to secure interrupt which causes an endless loop somewhere in Trust Zone. The only reason it is working right now is because Qualcomm Hypervisor maps the same region as Non-Cacheable memory in Stage 2 translation tables. The issue manifests if we want to use another hypervisor (like Xen or KVM), which does not know anything about those specific mappings. Changing the mapping of cmd-db memory from MEMREMAP_WB to MEMREMAP_WT/WC removes dependency on correct mappings in Stage 2 tables. This patch fixes the issue by updating the mapping to MEMREMAP_WC. I tested this on SA8155P with Xen.

AI-Powered Analysis

AILast updated: 06/29/2025, 00:25:01 UTC

Technical Analysis

CVE-2024-46689 is a vulnerability identified in the Linux kernel specifically related to the Qualcomm (qcom) subsystem's command database (cmd-db) memory mapping. The issue arises from how shared memory regions are mapped with respect to caching policies. The cmd-db memory region is write-protected by the eXecute Protection Unit (XPU), which is designed to prevent unauthorized writes. However, the XPU can sometimes misinterpret clean cache evictions as writes to this protected memory, triggering a secure interrupt that leads to an endless loop within the TrustZone environment. This behavior effectively causes a denial of service condition. The vulnerability manifests primarily when using hypervisors other than the Qualcomm Hypervisor, such as Xen or KVM, because these hypervisors do not apply the same memory mapping strategies (specifically Stage 2 translation tables) that Qualcomm Hypervisor uses. Qualcomm Hypervisor maps the cmd-db region as Non-Cacheable memory, preventing the false write detection. The fix involves changing the memory mapping from write-back (WB) caching to write-combining (WC) caching (MEMREMAP_WC), which removes the dependency on hypervisor-specific memory mappings and prevents the XPU from falsely detecting writes. This patch has been tested on the SA8155P platform with Xen hypervisor. The vulnerability does not appear to have known exploits in the wild yet, and it affects Linux kernel versions identified by a specific commit hash. Since this vulnerability involves low-level memory management and secure environment interactions, it is a nuanced issue affecting systems running Linux on Qualcomm platforms with alternative hypervisors.

Potential Impact

For European organizations, the impact of CVE-2024-46689 can be significant in environments where Linux is deployed on Qualcomm-based hardware platforms, especially those using alternative hypervisors like Xen or KVM instead of the Qualcomm Hypervisor. This includes embedded systems, IoT devices, telecommunications infrastructure, and possibly edge computing nodes that rely on TrustZone for security. The vulnerability can cause denial of service by triggering endless loops in the TrustZone secure environment, potentially leading to system instability or downtime. This could disrupt critical services, especially in sectors such as telecommunications, automotive, industrial control systems, and defense, where Qualcomm SoCs and Linux are prevalent. The impact on confidentiality and integrity is less direct, as the vulnerability primarily causes availability issues. However, persistent denial of service in secure environments could indirectly affect security posture and operational continuity. Given the reliance on hypervisors in virtualized environments, organizations running virtualized Linux instances on Qualcomm hardware may face increased risk if they do not apply the patch. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation, especially as awareness of the vulnerability spreads.

Mitigation Recommendations

To mitigate CVE-2024-46689, European organizations should: 1) Apply the official Linux kernel patch that changes the cmd-db memory mapping from write-back to write-combining (MEMREMAP_WC) as soon as it becomes available in their Linux distribution or kernel version. 2) Audit and inventory all Qualcomm-based Linux systems, particularly those using Xen, KVM, or other non-Qualcomm hypervisors, to identify potentially affected devices. 3) Test the patch in controlled environments to ensure compatibility and stability, especially on platforms like SA8155P or similar Qualcomm SoCs. 4) Coordinate with hardware and hypervisor vendors to confirm that their products incorporate the fix or provide guidance on safe configurations. 5) Monitor system logs and TrustZone-related events for signs of secure interrupts or unusual behavior that could indicate attempts to trigger the vulnerability. 6) Consider implementing additional monitoring and alerting for denial of service symptoms in critical embedded or virtualized environments. 7) For new deployments, prefer hypervisor configurations and memory mappings that align with the patched behavior to avoid exposure. 8) Maintain up-to-date firmware and hypervisor versions that support or complement the Linux kernel fix.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-09-11T15:12:18.249Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9826c4522896dcbe0fc2

Added to database: 5/21/2025, 9:08:54 AM

Last enriched: 6/29/2025, 12:25:01 AM

Last updated: 7/28/2025, 5:29:45 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats