cve-2024-56574
Vulnerability from cvelistv5
Published
2024-12-27 14:23
Modified
2025-01-20 06:23
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: media: ts2020: fix null-ptr-deref in ts2020_probe() KASAN reported a null-ptr-deref issue when executing the following command: # echo ts2020 0x20 > /sys/bus/i2c/devices/i2c-0/new_device KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017] CPU: 53 UID: 0 PID: 970 Comm: systemd-udevd Not tainted 6.12.0-rc2+ #24 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009) RIP: 0010:ts2020_probe+0xad/0xe10 [ts2020] RSP: 0018:ffffc9000abbf598 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffffc0714809 RDX: 0000000000000002 RSI: ffff88811550be00 RDI: 0000000000000010 RBP: ffff888109868800 R08: 0000000000000001 R09: fffff52001577eb6 R10: 0000000000000000 R11: ffffc9000abbff50 R12: ffffffffc0714790 R13: 1ffff92001577eb8 R14: ffffffffc07190d0 R15: 0000000000000001 FS: 00007f95f13b98c0(0000) GS:ffff888149280000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555d2634b000 CR3: 0000000152236000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ts2020_probe+0xad/0xe10 [ts2020] i2c_device_probe+0x421/0xb40 really_probe+0x266/0x850 ... The cause of the problem is that when using sysfs to dynamically register an i2c device, there is no platform data, but the probe process of ts2020 needs to use platform data, resulting in a null pointer being accessed. Solve this problem by adding checks to platform data.
Impacted products
Vendor Product Version
Linux Linux Version: dc245a5f9b5163511e0c164c8aa47848f07b75a9
Version: dc245a5f9b5163511e0c164c8aa47848f07b75a9
Version: dc245a5f9b5163511e0c164c8aa47848f07b75a9
Version: dc245a5f9b5163511e0c164c8aa47848f07b75a9
Version: dc245a5f9b5163511e0c164c8aa47848f07b75a9
Version: dc245a5f9b5163511e0c164c8aa47848f07b75a9
Version: dc245a5f9b5163511e0c164c8aa47848f07b75a9
Create a notification for this product.
   Linux Linux Version: 4.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "drivers/media/dvb-frontends/ts2020.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "ced1c04e82e3ecc246b921b9733f0df0866aa50d",
                     status: "affected",
                     version: "dc245a5f9b5163511e0c164c8aa47848f07b75a9",
                     versionType: "git",
                  },
                  {
                     lessThan: "5a53f97cd5977911850b695add057f9965c1a2d6",
                     status: "affected",
                     version: "dc245a5f9b5163511e0c164c8aa47848f07b75a9",
                     versionType: "git",
                  },
                  {
                     lessThan: "b6208d1567f929105011bcdfd738f59a6bdc1088",
                     status: "affected",
                     version: "dc245a5f9b5163511e0c164c8aa47848f07b75a9",
                     versionType: "git",
                  },
                  {
                     lessThan: "dc03866b5f4aa2668946f8384a1e5286ae53bbaa",
                     status: "affected",
                     version: "dc245a5f9b5163511e0c164c8aa47848f07b75a9",
                     versionType: "git",
                  },
                  {
                     lessThan: "a2ed3b780f34e4a6403064208bc2c99d1ed85026",
                     status: "affected",
                     version: "dc245a5f9b5163511e0c164c8aa47848f07b75a9",
                     versionType: "git",
                  },
                  {
                     lessThan: "901070571bc191d1d8d7a1379bc5ba9446200999",
                     status: "affected",
                     version: "dc245a5f9b5163511e0c164c8aa47848f07b75a9",
                     versionType: "git",
                  },
                  {
                     lessThan: "4a058b34b52ed3feb1f3ff6fd26aefeeeed20cba",
                     status: "affected",
                     version: "dc245a5f9b5163511e0c164c8aa47848f07b75a9",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "drivers/media/dvb-frontends/ts2020.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "4.1",
                  },
                  {
                     lessThan: "4.1",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.4.*",
                     status: "unaffected",
                     version: "5.4.287",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.10.*",
                     status: "unaffected",
                     version: "5.10.231",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.15.*",
                     status: "unaffected",
                     version: "5.15.174",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.120",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.64",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.12.*",
                     status: "unaffected",
                     version: "6.12.4",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.13",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: ts2020: fix null-ptr-deref in ts2020_probe()\n\nKASAN reported a null-ptr-deref issue when executing the following\ncommand:\n\n  # echo ts2020 0x20 > /sys/bus/i2c/devices/i2c-0/new_device\n    KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n    CPU: 53 UID: 0 PID: 970 Comm: systemd-udevd Not tainted 6.12.0-rc2+ #24\n    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)\n    RIP: 0010:ts2020_probe+0xad/0xe10 [ts2020]\n    RSP: 0018:ffffc9000abbf598 EFLAGS: 00010202\n    RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffffc0714809\n    RDX: 0000000000000002 RSI: ffff88811550be00 RDI: 0000000000000010\n    RBP: ffff888109868800 R08: 0000000000000001 R09: fffff52001577eb6\n    R10: 0000000000000000 R11: ffffc9000abbff50 R12: ffffffffc0714790\n    R13: 1ffff92001577eb8 R14: ffffffffc07190d0 R15: 0000000000000001\n    FS:  00007f95f13b98c0(0000) GS:ffff888149280000(0000) knlGS:0000000000000000\n    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n    CR2: 0000555d2634b000 CR3: 0000000152236000 CR4: 00000000000006f0\n    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n    Call Trace:\n     <TASK>\n     ts2020_probe+0xad/0xe10 [ts2020]\n     i2c_device_probe+0x421/0xb40\n     really_probe+0x266/0x850\n    ...\n\nThe cause of the problem is that when using sysfs to dynamically register\nan i2c device, there is no platform data, but the probe process of ts2020\nneeds to use platform data, resulting in a null pointer being accessed.\n\nSolve this problem by adding checks to platform data.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-20T06:23:21.981Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/ced1c04e82e3ecc246b921b9733f0df0866aa50d",
            },
            {
               url: "https://git.kernel.org/stable/c/5a53f97cd5977911850b695add057f9965c1a2d6",
            },
            {
               url: "https://git.kernel.org/stable/c/b6208d1567f929105011bcdfd738f59a6bdc1088",
            },
            {
               url: "https://git.kernel.org/stable/c/dc03866b5f4aa2668946f8384a1e5286ae53bbaa",
            },
            {
               url: "https://git.kernel.org/stable/c/a2ed3b780f34e4a6403064208bc2c99d1ed85026",
            },
            {
               url: "https://git.kernel.org/stable/c/901070571bc191d1d8d7a1379bc5ba9446200999",
            },
            {
               url: "https://git.kernel.org/stable/c/4a058b34b52ed3feb1f3ff6fd26aefeeeed20cba",
            },
         ],
         title: "media: ts2020: fix null-ptr-deref in ts2020_probe()",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-56574",
      datePublished: "2024-12-27T14:23:17.177Z",
      dateReserved: "2024-12-27T14:03:05.998Z",
      dateUpdated: "2025-01-20T06:23:21.981Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-56574\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-12-27T15:15:16.420\",\"lastModified\":\"2025-01-06T17:20:38.493\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmedia: ts2020: fix null-ptr-deref in ts2020_probe()\\n\\nKASAN reported a null-ptr-deref issue when executing the following\\ncommand:\\n\\n  # echo ts2020 0x20 > /sys/bus/i2c/devices/i2c-0/new_device\\n    KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\\n    CPU: 53 UID: 0 PID: 970 Comm: systemd-udevd Not tainted 6.12.0-rc2+ #24\\n    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)\\n    RIP: 0010:ts2020_probe+0xad/0xe10 [ts2020]\\n    RSP: 0018:ffffc9000abbf598 EFLAGS: 00010202\\n    RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffffc0714809\\n    RDX: 0000000000000002 RSI: ffff88811550be00 RDI: 0000000000000010\\n    RBP: ffff888109868800 R08: 0000000000000001 R09: fffff52001577eb6\\n    R10: 0000000000000000 R11: ffffc9000abbff50 R12: ffffffffc0714790\\n    R13: 1ffff92001577eb8 R14: ffffffffc07190d0 R15: 0000000000000001\\n    FS:  00007f95f13b98c0(0000) GS:ffff888149280000(0000) knlGS:0000000000000000\\n    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n    CR2: 0000555d2634b000 CR3: 0000000152236000 CR4: 00000000000006f0\\n    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\\n    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\\n    Call Trace:\\n     <TASK>\\n     ts2020_probe+0xad/0xe10 [ts2020]\\n     i2c_device_probe+0x421/0xb40\\n     really_probe+0x266/0x850\\n    ...\\n\\nThe cause of the problem is that when using sysfs to dynamically register\\nan i2c device, there is no platform data, but the probe process of ts2020\\nneeds to use platform data, resulting in a null pointer being accessed.\\n\\nSolve this problem by adding checks to platform data.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: ts2020: fix null-ptr-deref in ts2020_probe() KASAN informó un problema de null-ptr-deref al ejecutar el siguiente comando: # echo ts2020 0x20 &gt; /sys/bus/i2c/devices/i2c-0/new_device KASAN: null-ptr-deref in range [0x000000000000010-0x0000000000000017] CPU: 53 UID: 0 PID: 970 Comm: systemd-udevd No contaminado 6.12.0-rc2+ #24 Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009) RIP: 0010:ts2020_probe+0xad/0xe10 [ts2020] RSP: 0018:ffffc9000abbf598 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffffc0714809 RDX: 0000000000000002 RSI: ffff88811550be00 RDI: 0000000000000010 RBP: ffff888109868800 R08: 0000000000000001 R09: fffff52001577eb6 R10: 00000000000000000 R11: ffffc9000abbff50 R12: ffffffffc0714790 R13: 1ffff92001577eb8 R14: ffffffffc07190d0 R15: 0000000000000001 FS: 00007f95f13b98c0(0000) GS:ffff888149280000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555d2634b000 CR3: 0000000152236000 CR4: 000000000000006f0 DR0: 00000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas:  ts2020_probe+0xad/0xe10 [ts2020] i2c_device_probe+0x421/0xb40 really_probe+0x266/0x850 ... La causa del problema es que al usar sysfs para registrar dinámicamente un Dispositivo i2c, no hay datos de plataforma, pero el proceso de sondeo de ts2020 necesita utilizar datos de plataforma, lo que da como resultado el acceso a un puntero nulo. Resuelva este problema agregando comprobaciones a los datos de plataforma.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1\",\"versionEndExcluding\":\"5.4.287\",\"matchCriteriaId\":\"4B08AFEE-D4EF-47B3-BD35-5A861B359191\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.231\",\"matchCriteriaId\":\"B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.174\",\"matchCriteriaId\":\"419FD073-1517-4FD5-8158-F94BC68A1E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.120\",\"matchCriteriaId\":\"09AC6122-E2A4-40FE-9D33-268A1B2EC265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.64\",\"matchCriteriaId\":\"CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.12.4\",\"matchCriteriaId\":\"04756810-D093-4B43-B1D9-CF5035968061\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/4a058b34b52ed3feb1f3ff6fd26aefeeeed20cba\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5a53f97cd5977911850b695add057f9965c1a2d6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/901070571bc191d1d8d7a1379bc5ba9446200999\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a2ed3b780f34e4a6403064208bc2c99d1ed85026\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b6208d1567f929105011bcdfd738f59a6bdc1088\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ced1c04e82e3ecc246b921b9733f0df0866aa50d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/dc03866b5f4aa2668946f8384a1e5286ae53bbaa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.