CVE-2024-56576

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
27/12/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: i2c: tc358743: Fix crash in the probe error path when using polling<br /> <br /> If an error occurs in the probe() function, we should remove the polling<br /> timer that was alarmed earlier, otherwise the timer is called with<br /> arguments that are already freed, which results in a crash.<br /> <br /> ------------[ cut here ]------------<br /> WARNING: CPU: 3 PID: 0 at kernel/time/timer.c:1830 __run_timers+0x244/0x268<br /> Modules linked in:<br /> CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.11.0 #226<br /> Hardware name: Diasom DS-RK3568-SOM-EVB (DT)<br /> pstate: 804000c9 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> pc : __run_timers+0x244/0x268<br /> lr : __run_timers+0x1d4/0x268<br /> sp : ffffff80eff2baf0<br /> x29: ffffff80eff2bb50 x28: 7fffffffffffffff x27: ffffff80eff2bb00<br /> x26: ffffffc080f669c0 x25: ffffff80efef6bf0 x24: ffffff80eff2bb00<br /> x23: 0000000000000000 x22: dead000000000122 x21: 0000000000000000<br /> x20: ffffff80efef6b80 x19: ffffff80041c8bf8 x18: ffffffffffffffff<br /> x17: ffffffc06f146000 x16: ffffff80eff27dc0 x15: 000000000000003e<br /> x14: 0000000000000000 x13: 00000000000054da x12: 0000000000000000<br /> x11: 00000000000639c0 x10: 000000000000000c x9 : 0000000000000009<br /> x8 : ffffff80eff2cb40 x7 : ffffff80eff2cb40 x6 : ffffff8002bee480<br /> x5 : ffffffc080cb2220 x4 : ffffffc080cb2150 x3 : 00000000000f4240<br /> x2 : 0000000000000102 x1 : ffffff80eff2bb00 x0 : ffffff80041c8bf0<br /> Call trace:<br />  __run_timers+0x244/0x268<br />  timer_expire_remote+0x50/0x68<br />  tmigr_handle_remote+0x388/0x39c<br />  run_timer_softirq+0x38/0x44<br />  handle_softirqs+0x138/0x298<br />  __do_softirq+0x14/0x20<br />  ____do_softirq+0x10/0x1c<br />  call_on_irq_stack+0x24/0x4c<br />  do_softirq_own_stack+0x1c/0x2c<br />  irq_exit_rcu+0x9c/0xcc<br />  el1_interrupt+0x48/0xc0<br />  el1h_64_irq_handler+0x18/0x24<br />  el1h_64_irq+0x7c/0x80<br />  default_idle_call+0x34/0x68<br />  do_idle+0x23c/0x294<br />  cpu_startup_entry+0x38/0x3c<br />  secondary_start_kernel+0x128/0x160<br />  __secondary_switched+0xb8/0xbc<br /> ---[ end trace 0000000000000000 ]---

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.13 (including) 5.4.287 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.231 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.174 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.120 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.64 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.4 (excluding)