Executive Summary

Informations
Name CVE-2024-50057 First vendor Publication 2024-10-21
Vendor Cve Last vendor Modification 2024-10-24

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Overall CVSS Score 3.3
Base Score 3.3 Environmental Score 3.3
impact SubScore 1.4 Temporal Score 3.3
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact Low
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tipd: Free IRQ only if it was requested before

In polling mode, if no IRQ was requested there is no need to free it. Call devm_free_irq() only if client->irq is set. This fixes the warning caused by the tps6598x module removal:

WARNING: CPU: 2 PID: 333 at kernel/irq/devres.c:144 devm_free_irq+0x80/0x8c ... ... Call trace:
devm_free_irq+0x80/0x8c
tps6598x_remove+0x28/0x88 [tps6598x]
i2c_device_remove+0x2c/0x9c
device_remove+0x4c/0x80
device_release_driver_internal+0x1cc/0x228
driver_detach+0x50/0x98
bus_remove_driver+0x6c/0xbc
driver_unregister+0x30/0x60
i2c_del_driver+0x54/0x64
tps6598x_i2c_driver_exit+0x18/0xc3c [tps6598x]
__arm64_sys_delete_module+0x184/0x264
invoke_syscall+0x48/0x110
el0_svc_common.constprop.0+0xc8/0xe8
do_el0_svc+0x20/0x2c
el0_svc+0x28/0x98
el0t_64_sync_handler+0x13c/0x158
el0t_64_sync+0x190/0x194

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50057

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-763 Release of Invalid Pointer or Reference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3691

Sources (Detail)

https://git.kernel.org/stable/c/4d4b23c119542fbaed2a16794d3801cb4806ea02
https://git.kernel.org/stable/c/b72bf5cade51ba4055c8a8998d275e72e6b521ce
https://git.kernel.org/stable/c/db63d9868f7f310de44ba7bea584e2454f8b4ed0
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Date Informations
2025-06-26 02:36:34
  • Multiple Updates
2025-06-25 12:34:59
  • Multiple Updates
2025-06-24 02:41:13
  • Multiple Updates
2025-05-27 02:46:21
  • Multiple Updates
2025-03-29 03:42:24
  • Multiple Updates
2025-03-28 13:46:13
  • Multiple Updates
2025-03-28 03:20:09
  • Multiple Updates
2025-03-19 03:15:25
  • Multiple Updates
2025-03-18 03:28:22
  • Multiple Updates
2025-03-14 03:15:37
  • Multiple Updates
2025-03-06 14:12:10
  • Multiple Updates
2025-02-22 03:25:43
  • Multiple Updates
2025-01-08 03:06:38
  • Multiple Updates
2025-01-07 03:06:11
  • Multiple Updates
2024-12-25 03:04:48
  • Multiple Updates
2024-12-12 03:07:44
  • Multiple Updates
2024-11-23 03:04:35
  • Multiple Updates
2024-11-22 03:02:43
  • Multiple Updates
2024-11-20 03:01:00
  • Multiple Updates
2024-11-14 03:01:12
  • Multiple Updates
2024-11-09 03:01:09
  • Multiple Updates
2024-10-26 02:58:07
  • Multiple Updates
2024-10-26 00:27:30
  • Multiple Updates
2024-10-25 03:00:32
  • Multiple Updates
2024-10-24 21:27:30
  • Multiple Updates
2024-10-23 21:27:32
  • Multiple Updates
2024-10-22 00:27:27
  • First insertion