CVE-2024-56700
Severity CVSS v4.0: 
            Pending analysis
                                                    Type: 
          
                          CWE-476
                        NULL Pointer Dereference
          
        Publication date: 
                          28/12/2024
                  Last modified: 
                          26/09/2025
                  Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: wl128x: Fix atomicity violation in fmc_send_cmd()<br />
<br />
Atomicity violation occurs when the fmc_send_cmd() function is executed<br />
simultaneously with the modification of the fmdev->resp_skb value.<br />
Consider a scenario where, after passing the validity check within the<br />
function, a non-null fmdev->resp_skb variable is assigned a null value.<br />
This results in an invalid fmdev->resp_skb variable passing the validity<br />
check. As seen in the later part of the function, skb = fmdev->resp_skb;<br />
when the invalid fmdev->resp_skb passes the check, a null pointer<br />
dereference error may occur at line 478, evt_hdr = (void *)skb->data;<br />
<br />
To address this issue, it is recommended to include the validity check of<br />
fmdev->resp_skb within the locked section of the function. This<br />
modification ensures that the value of fmdev->resp_skb does not change<br />
during the validation process, thereby maintaining its validity.<br />
<br />
This possible bug is found by an experimental static analysis tool<br />
developed by our team. This tool analyzes the locking APIs<br />
to extract function pairs that can be concurrently executed, and then<br />
analyzes the instructions in the paired functions to identify possible<br />
concurrency bugs including data races and atomicity violations.
              Impact
Base Score 3.x
          5.50
        Severity 3.x
          MEDIUM
        Vulnerable products and versions
| CPE | From | Up to | 
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.39 (including) | 4.19.325 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.287 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.231 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.174 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.120 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) | 
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2e63c908de357048180516b84740ed62dac0b269
 - https://git.kernel.org/stable/c/372dc9509122e5d45d4c12978e31c3c7d00aaca4
 - https://git.kernel.org/stable/c/378ce4e08ca2b1ac7bbf1d57b68643ca4226c5f8
 - https://git.kernel.org/stable/c/3c818ad07e964bca3d27adac1e1f50e1e3c9180e
 - https://git.kernel.org/stable/c/80a3b2ee01eecf22dfa06968b3cde92c691dea10
 - https://git.kernel.org/stable/c/ca59f9956d4519ab18ab2270be47c6b8c6ced091
 - https://git.kernel.org/stable/c/d16109c9fdc1b8cea4fe63b42e06e926c3f68990
 - https://git.kernel.org/stable/c/d7408a052aa1b4f6fb6f1c7a8877b84017a07ac9
 - https://git.kernel.org/stable/c/ed228b74d8a500380150965d5becabf9a1e33141
 



