{"id":"CVE-2024-56700","summary":"media: wl128x: Fix atomicity violation in fmc_send_cmd()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: wl128x: Fix atomicity violation in fmc_send_cmd()\n\nAtomicity violation occurs when the fmc_send_cmd() function is executed\nsimultaneously with the modification of the fmdev-\u003eresp_skb value.\nConsider a scenario where, after passing the validity check within the\nfunction, a non-null fmdev-\u003eresp_skb variable is assigned a null value.\nThis results in an invalid fmdev-\u003eresp_skb variable passing the validity\ncheck. As seen in the later part of the function, skb = fmdev-\u003eresp_skb;\nwhen the invalid fmdev-\u003eresp_skb passes the check, a null pointer\ndereference error may occur at line 478, evt_hdr = (void *)skb-\u003edata;\n\nTo address this issue, it is recommended to include the validity check of\nfmdev-\u003eresp_skb within the locked section of the function. This\nmodification ensures that the value of fmdev-\u003eresp_skb does not change\nduring the validation process, thereby maintaining its validity.\n\nThis possible bug is found by an experimental static analysis tool\ndeveloped by our team. This tool analyzes the locking APIs\nto extract function pairs that can be concurrently executed, and then\nanalyzes the instructions in the paired functions to identify possible\nconcurrency bugs including data races and atomicity violations.","modified":"2026-04-02T12:25:08.916003Z","published":"2024-12-28T09:46:22.770Z","related":["SUSE-SU-2025:0289-1","SUSE-SU-2025:0428-1","SUSE-SU-2025:0499-1","SUSE-SU-2025:0557-1","SUSE-SU-2025:0565-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7276-1","USN-7277-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56700.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2e63c908de357048180516b84740ed62dac0b269"},{"type":"WEB","url":"https://git.kernel.org/stable/c/372dc9509122e5d45d4c12978e31c3c7d00aaca4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/378ce4e08ca2b1ac7bbf1d57b68643ca4226c5f8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3c818ad07e964bca3d27adac1e1f50e1e3c9180e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/80a3b2ee01eecf22dfa06968b3cde92c691dea10"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ca59f9956d4519ab18ab2270be47c6b8c6ced091"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d16109c9fdc1b8cea4fe63b42e06e926c3f68990"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d7408a052aa1b4f6fb6f1c7a8877b84017a07ac9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ed228b74d8a500380150965d5becabf9a1e33141"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56700.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56700"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e8454ff7b9a4d56f02c095bff12d3c92ef4c7fa6"},{"fixed":"d16109c9fdc1b8cea4fe63b42e06e926c3f68990"},{"fixed":"3c818ad07e964bca3d27adac1e1f50e1e3c9180e"},{"fixed":"d7408a052aa1b4f6fb6f1c7a8877b84017a07ac9"},{"fixed":"ed228b74d8a500380150965d5becabf9a1e33141"},{"fixed":"372dc9509122e5d45d4c12978e31c3c7d00aaca4"},{"fixed":"378ce4e08ca2b1ac7bbf1d57b68643ca4226c5f8"},{"fixed":"2e63c908de357048180516b84740ed62dac0b269"},{"fixed":"80a3b2ee01eecf22dfa06968b3cde92c691dea10"},{"fixed":"ca59f9956d4519ab18ab2270be47c6b8c6ced091"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56700.json"}}],"schema_version":"1.7.5"}