CVE-2024-50198
Vulnerability from cvelistv5
Published
2024-11-08 05:54
Modified
2024-11-08 05:54
Severity ?
EPSS score ?
Summary
iio: light: veml6030: fix IIO device retrieval from embedded device
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/iio/light/veml6030.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "bf3ab8e1c28f", "status": "affected", "version": "7b779f573c48", "versionType": "git" }, { "lessThan": "50039aec43a8", "status": "affected", "version": "7b779f573c48", "versionType": "git" }, { "lessThan": "bcb90518ccd9", "status": "affected", "version": "7b779f573c48", "versionType": "git" }, { "lessThan": "2cbb41abae65", "status": "affected", "version": "7b779f573c48", "versionType": "git" }, { "lessThan": "905166531831", "status": "affected", "version": "7b779f573c48", "versionType": "git" }, { "lessThan": "c7c44e57750c", "status": "affected", "version": "7b779f573c48", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/iio/light/veml6030.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.5" }, { "lessThan": "5.5", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.228", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.169", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.114", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.58", "versionType": "semver" }, { "lessThanOrEqual": "6.11.*", "status": "unaffected", "version": "6.11.5", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.12-rc4", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: light: veml6030: fix IIO device retrieval from embedded device\n\nThe dev pointer that is received as an argument in the\nin_illuminance_period_available_show function references the device\nembedded in the IIO device, not in the i2c client.\n\ndev_to_iio_dev() must be used to accessthe right data. The current\nimplementation leads to a segmentation fault on every attempt to read\nthe attribute because indio_dev gets a NULL assignment.\n\nThis bug has been present since the first appearance of the driver,\napparently since the last version (V6) before getting applied. A\nconstant attribute was used until then, and the last modifications might\nhave not been tested again." } ], "providerMetadata": { "dateUpdated": "2024-11-08T05:54:12.450Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/bf3ab8e1c28f10df0823d4ff312f83c952b06a15" }, { "url": "https://git.kernel.org/stable/c/50039aec43a82ad2495f2d0fb0c289c8717b4bb2" }, { "url": "https://git.kernel.org/stable/c/bcb90518ccd9e10bf6ab29e31994aab93e4a4361" }, { "url": "https://git.kernel.org/stable/c/2cbb41abae65626736b8b52cf3b9339612c5a86a" }, { "url": "https://git.kernel.org/stable/c/905166531831beb067fffe2bdfc98031ffe89087" }, { "url": "https://git.kernel.org/stable/c/c7c44e57750c31de43906d97813273fdffcf7d02" } ], "title": "iio: light: veml6030: fix IIO device retrieval from embedded device", "x_generator": { "engine": "bippy-9e1c9544281a" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-50198", "datePublished": "2024-11-08T05:54:12.450Z", "dateReserved": "2024-10-21T19:36:19.969Z", "dateUpdated": "2024-11-08T05:54:12.450Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-50198\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-11-08T06:15:16.467\",\"lastModified\":\"2024-11-08T19:01:03.880\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\niio: light: veml6030: fix IIO device retrieval from embedded device\\n\\nThe dev pointer that is received as an argument in the\\nin_illuminance_period_available_show function references the device\\nembedded in the IIO device, not in the i2c client.\\n\\ndev_to_iio_dev() must be used to accessthe right data. The current\\nimplementation leads to a segmentation fault on every attempt to read\\nthe attribute because indio_dev gets a NULL assignment.\\n\\nThis bug has been present since the first appearance of the driver,\\napparently since the last version (V6) before getting applied. A\\nconstant attribute was used until then, and the last modifications might\\nhave not been tested again.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: light: veml6030: fix IIO device retrieval from built-in device El puntero dev que se recibe como argumento en la funci\u00f3n in_illuminance_period_available_show hace referencia al dispositivo integrado en el dispositivo IIO, no en el cliente i2c. Se debe utilizar dev_to_iio_dev() para acceder a los datos correctos. La implementaci\u00f3n actual genera un error de segmentaci\u00f3n en cada intento de leer el atributo porque indio_dev obtiene una asignaci\u00f3n NULL. Este error ha estado presente desde la primera aparici\u00f3n del controlador, aparentemente desde la \u00faltima versi\u00f3n (V6) antes de aplicarse. Hasta entonces se utilizaba un atributo constante y es posible que no se hayan vuelto a probar las \u00faltimas modificaciones.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2cbb41abae65626736b8b52cf3b9339612c5a86a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/50039aec43a82ad2495f2d0fb0c289c8717b4bb2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/905166531831beb067fffe2bdfc98031ffe89087\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bcb90518ccd9e10bf6ab29e31994aab93e4a4361\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bf3ab8e1c28f10df0823d4ff312f83c952b06a15\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c7c44e57750c31de43906d97813273fdffcf7d02\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.