
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-56700 addresses an atomicity violation vulnerability in the Linux kernel's wl128x FM radio driver. The issue was discovered in December 2024 and affects the fmc_send_cmd() function in the media subsystem. The vulnerability was identified using an experimental static analysis tool that detects concurrency bugs (NVD).
The vulnerability occurs when the fmc_send_cmd() function is executed simultaneously with modifications to the fmdev->resp_skb value. After passing the validity check, a non-null fmdev->resp_skb variable could be assigned a null value, leading to an invalid variable passing the validity check. This could result in a null pointer dereference error at line 478 when executing evt_hdr = (void *)skb->data. The issue stems from improper locking mechanisms around the validity check of fmdev->resp_skb (Kernel Commit).
The vulnerability could lead to a null pointer dereference in the Linux kernel's wl128x FM radio driver, potentially causing system crashes or denial of service conditions (Debian Tracker).
The issue has been fixed by including the validity check of fmdev->resp_skb within the locked section of the function, ensuring that the value cannot change during the validation process. Fixed versions are available in Linux kernel versions 5.10.234-1 for Debian bullseye and 6.1.128-1 for Debian bookworm (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."