目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2024-56685— Linux kernel 安全漏洞

EPSS 0.02% · P6
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2024-56685 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
ASoC: mediatek: Check num_codecs is not zero to avoid panic during probe
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: Check num_codecs is not zero to avoid panic during probe Following commit 13f58267cda3 ("ASoC: soc.h: don't create dummy Component via COMP_DUMMY()"), COMP_DUMMY() became an array with zero length, and only gets populated with the dummy struct after the card is registered. Since the sound card driver's probe happens before the card registration, accessing any of the members of a dummy component during probe will result in undefined behavior. This can be observed in the mt8188 and mt8195 machine sound drivers. By omitting a dai link subnode in the sound card's node in the Devicetree, the default uninitialized dummy codec is used, and when its dai_name pointer gets passed to strcmp() it results in a null pointer dereference and a kernel panic. In addition to that, set_card_codec_info() in the generic helpers file, mtk-soundcard-driver.c, will populate a dai link with a dummy codec when a dai link node is present in DT but with no codec property. The result is that at probe time, a dummy codec can either be uninitialized with num_codecs = 0, or be an initialized dummy codec, with num_codecs = 1 and dai_name = "snd-soc-dummy-dai". In order to accommodate for both situations, check that num_codecs is not zero before accessing the codecs' fields but still check for the codec's dai name against "snd-soc-dummy-dai" as needed. While at it, also drop the check that dai_name is not null in the mt8192 driver, introduced in commit 4d4e1b6319e5 ("ASoC: mediatek: mt8192: Check existence of dai_name before dereferencing"), as it is actually redundant given the preceding num_codecs != 0 check.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于bpf模块中bpf_msg_pop_data函数中的多个问题,可能导致内存错误。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 13f58267cda3d6946c8f4de368ad5d4a003baa61 ~ 376f4800f34a28def026ff5c5d4fc5e54e1744ff -
LinuxLinux 6.8 -

二、漏洞 CVE-2024-56685 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2024-56685 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2024-12-28 · 共 32 条

CVE-2024-56692Linux kernel 安全漏洞
CVE-2024-56708Linux kernel 安全漏洞
CVE-2024-56707Linux kernel 安全漏洞
CVE-2024-56705Linux kernel 安全漏洞
CVE-2024-56706Linux kernel 安全漏洞
CVE-2024-56704Linux kernel 安全漏洞
CVE-2024-56703Linux kernel 安全漏洞
CVE-2024-56701Linux kernel 安全漏洞
CVE-2024-56702Linux kernel 安全漏洞
CVE-2024-56700Linux kernel 安全漏洞
CVE-2024-56699Linux kernel 安全漏洞
CVE-2024-56698Linux kernel 安全漏洞
CVE-2024-56697Linux kernel 安全漏洞
CVE-2024-56696Linux kernel 安全漏洞
CVE-2024-56694Linux kernel 安全漏洞
CVE-2024-56695Linux kernel 安全漏洞
CVE-2024-56676Linux kernel 安全漏洞
CVE-2024-56693Linux kernel 安全漏洞
CVE-2024-56691Linux kernel 安全漏洞
CVE-2024-56689Linux kernel 安全漏洞

显示前 20 条,共 32 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-56685

暂无评论


发表评论