Skip to main content

CVE-2024-56575: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-56575cvecve-2024-56575
Published: Fri Dec 27 2024 (12/27/2024, 14:23:17 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: media: imx-jpeg: Ensure power suppliers be suspended before detach them The power suppliers are always requested to suspend asynchronously, dev_pm_domain_detach() requires the caller to ensure proper synchronization of this function with power management callbacks. otherwise the detach may led to kernel panic, like below: [ 1457.107934] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000040 [ 1457.116777] Mem abort info: [ 1457.119589] ESR = 0x0000000096000004 [ 1457.123358] EC = 0x25: DABT (current EL), IL = 32 bits [ 1457.128692] SET = 0, FnV = 0 [ 1457.131764] EA = 0, S1PTW = 0 [ 1457.134920] FSC = 0x04: level 0 translation fault [ 1457.139812] Data abort info: [ 1457.142707] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 1457.148196] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1457.153256] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1457.158563] user pgtable: 4k pages, 48-bit VAs, pgdp=00000001138b6000 [ 1457.165000] [0000000000000040] pgd=0000000000000000, p4d=0000000000000000 [ 1457.171792] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP [ 1457.178045] Modules linked in: v4l2_jpeg wave6_vpu_ctrl(-) [last unloaded: mxc_jpeg_encdec] [ 1457.186383] CPU: 0 PID: 51938 Comm: kworker/0:3 Not tainted 6.6.36-gd23d64eea511 #66 [ 1457.194112] Hardware name: NXP i.MX95 19X19 board (DT) [ 1457.199236] Workqueue: pm pm_runtime_work [ 1457.203247] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1457.210188] pc : genpd_runtime_suspend+0x20/0x290 [ 1457.214886] lr : __rpm_callback+0x48/0x1d8 [ 1457.218968] sp : ffff80008250bc50 [ 1457.222270] x29: ffff80008250bc50 x28: 0000000000000000 x27: 0000000000000000 [ 1457.229394] x26: 0000000000000000 x25: 0000000000000008 x24: 00000000000f4240 [ 1457.236518] x23: 0000000000000000 x22: ffff00008590f0e4 x21: 0000000000000008 [ 1457.243642] x20: ffff80008099c434 x19: ffff00008590f000 x18: ffffffffffffffff [ 1457.250766] x17: 5300326563697665 x16: 645f676e696c6f6f x15: 63343a6d726f6674 [ 1457.257890] x14: 0000000000000004 x13: 00000000000003a4 x12: 0000000000000002 [ 1457.265014] x11: 0000000000000000 x10: 0000000000000a60 x9 : ffff80008250bbb0 [ 1457.272138] x8 : ffff000092937200 x7 : ffff0003fdf6af80 x6 : 0000000000000000 [ 1457.279262] x5 : 00000000410fd050 x4 : 0000000000200000 x3 : 0000000000000000 [ 1457.286386] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00008590f000 [ 1457.293510] Call trace: [ 1457.295946] genpd_runtime_suspend+0x20/0x290 [ 1457.300296] __rpm_callback+0x48/0x1d8 [ 1457.304038] rpm_callback+0x6c/0x78 [ 1457.307515] rpm_suspend+0x10c/0x570 [ 1457.311077] pm_runtime_work+0xc4/0xc8 [ 1457.314813] process_one_work+0x138/0x248 [ 1457.318816] worker_thread+0x320/0x438 [ 1457.322552] kthread+0x110/0x114 [ 1457.325767] ret_from_fork+0x10/0x20

AI-Powered Analysis

AILast updated: 06/28/2025, 11:56:47 UTC

Technical Analysis

CVE-2024-56575 is a vulnerability identified in the Linux kernel, specifically affecting the media subsystem component related to the imx-jpeg driver. The flaw arises from improper handling of power management operations, where power suppliers are asynchronously suspended without ensuring proper synchronization before detachment. The Linux kernel function dev_pm_domain_detach() requires that callers synchronize correctly with power management callbacks to avoid race conditions. Failure to do so can lead to a kernel panic caused by a NULL pointer dereference, as demonstrated by the provided kernel oops logs. This issue manifests during runtime power management operations, particularly when the system attempts to suspend power suppliers asynchronously but detaches them prematurely or unsafely. The vulnerability is tied to the NXP i.MX95 platform, which uses the imx-jpeg driver for JPEG encoding/decoding. The kernel panic results in a denial of service (DoS) condition, crashing the affected system or device. The root cause is a synchronization bug in the power management domain handling code, which can be triggered during power state transitions. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in certain recent kernel builds prior to the fix. This vulnerability is primarily a stability and availability risk rather than a direct confidentiality or integrity compromise. However, systems relying on the affected driver and kernel versions may experience unexpected crashes, impacting operational continuity.

Potential Impact

For European organizations, the impact of CVE-2024-56575 depends largely on their use of embedded Linux systems or devices running the affected kernel versions with the imx-jpeg driver, particularly those based on NXP i.MX95 or similar hardware platforms. Industries such as manufacturing, automotive, telecommunications, and IoT deployments that utilize embedded Linux for media processing could face system instability or downtime due to kernel panics triggered by this vulnerability. This could disrupt critical operations, especially in real-time or safety-critical environments. While the vulnerability does not appear to allow privilege escalation or data breaches, the denial of service caused by kernel crashes can lead to loss of availability, affecting service delivery and potentially causing financial and reputational damage. European organizations with supply chains or products incorporating affected hardware and Linux kernel versions should be vigilant. The lack of known exploits reduces immediate risk, but the vulnerability’s presence in the kernel means that attackers with local access or the ability to trigger power management events could exploit it to cause system crashes. This is particularly relevant for embedded devices in industrial control systems or network infrastructure where uptime is critical.

Mitigation Recommendations

To mitigate CVE-2024-56575, European organizations should: 1) Identify and inventory all systems running affected Linux kernel versions with the imx-jpeg driver, especially on NXP i.MX95 or related platforms. 2) Apply the official Linux kernel patches that address the synchronization issue in power management domain detach operations as soon as they become available. Monitor Linux kernel mailing lists and vendor advisories for patch releases. 3) For embedded devices where kernel upgrades are challenging, consider implementing workarounds such as disabling runtime power management for the affected devices temporarily to prevent asynchronous suspend/detach sequences. 4) Conduct thorough testing of power management workflows post-patch to ensure stability and no regressions. 5) Implement monitoring to detect kernel panics or abnormal reboots that could indicate exploitation attempts or triggering of the vulnerability. 6) Restrict local access to vulnerable devices to trusted personnel only, minimizing the risk of malicious triggering. 7) Collaborate with hardware and software vendors to ensure timely firmware and kernel updates are provided and deployed. 8) For critical infrastructure, consider redundancy and failover mechanisms to maintain availability in case of device crashes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-27T14:03:05.998Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdf2c2

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 11:56:47 AM

Last updated: 8/3/2025, 6:39:00 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats