CVE-2024-35830

In the Linux kernel, the following vulnerability has been resolved: media: tc358743: register v4l2 async device only after successful setup Ensure the device has been setup correctly before registering the v4l2 async device, thus allowing userspace to access.
References
Link Resource
https://git.kernel.org/stable/c/17c2650de14842c25c569cbb2126c421489a3a24 Patch
https://git.kernel.org/stable/c/4f1490a5d7a0472ee5d9f36547bc4ba46be755c7 Patch
https://git.kernel.org/stable/c/610f20e5cf35ca9c0992693cae0dd8643ce932e7 Patch
https://git.kernel.org/stable/c/87399f1ff92203d65f1febf5919429f4bb613a02 Patch
https://git.kernel.org/stable/c/8ba8db9786b55047df5ad3db3e01dd886687a77d Patch
https://git.kernel.org/stable/c/b8505a1aee8f1edc9d16d72ae09c93de086e2a1a Patch
https://git.kernel.org/stable/c/c915c46a25c3efb084c4f5e69a053d7f7a635496 Patch
https://git.kernel.org/stable/c/daf21394f9898fb9f0698c3e50de08132d2164e6 Patch
https://git.kernel.org/stable/c/edbb3226c985469a2f8eb69885055c9f5550f468 Patch
https://git.kernel.org/stable/c/17c2650de14842c25c569cbb2126c421489a3a24 Patch
https://git.kernel.org/stable/c/4f1490a5d7a0472ee5d9f36547bc4ba46be755c7 Patch
https://git.kernel.org/stable/c/610f20e5cf35ca9c0992693cae0dd8643ce932e7 Patch
https://git.kernel.org/stable/c/87399f1ff92203d65f1febf5919429f4bb613a02 Patch
https://git.kernel.org/stable/c/8ba8db9786b55047df5ad3db3e01dd886687a77d Patch
https://git.kernel.org/stable/c/b8505a1aee8f1edc9d16d72ae09c93de086e2a1a Patch
https://git.kernel.org/stable/c/c915c46a25c3efb084c4f5e69a053d7f7a635496 Patch
https://git.kernel.org/stable/c/daf21394f9898fb9f0698c3e50de08132d2164e6 Patch
https://git.kernel.org/stable/c/edbb3226c985469a2f8eb69885055c9f5550f468 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

17 Dec 2025, 19:23

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/17c2650de14842c25c569cbb2126c421489a3a24 - () https://git.kernel.org/stable/c/17c2650de14842c25c569cbb2126c421489a3a24 - Patch
References () https://git.kernel.org/stable/c/4f1490a5d7a0472ee5d9f36547bc4ba46be755c7 - () https://git.kernel.org/stable/c/4f1490a5d7a0472ee5d9f36547bc4ba46be755c7 - Patch
References () https://git.kernel.org/stable/c/610f20e5cf35ca9c0992693cae0dd8643ce932e7 - () https://git.kernel.org/stable/c/610f20e5cf35ca9c0992693cae0dd8643ce932e7 - Patch
References () https://git.kernel.org/stable/c/87399f1ff92203d65f1febf5919429f4bb613a02 - () https://git.kernel.org/stable/c/87399f1ff92203d65f1febf5919429f4bb613a02 - Patch
References () https://git.kernel.org/stable/c/8ba8db9786b55047df5ad3db3e01dd886687a77d - () https://git.kernel.org/stable/c/8ba8db9786b55047df5ad3db3e01dd886687a77d - Patch
References () https://git.kernel.org/stable/c/b8505a1aee8f1edc9d16d72ae09c93de086e2a1a - () https://git.kernel.org/stable/c/b8505a1aee8f1edc9d16d72ae09c93de086e2a1a - Patch
References () https://git.kernel.org/stable/c/c915c46a25c3efb084c4f5e69a053d7f7a635496 - () https://git.kernel.org/stable/c/c915c46a25c3efb084c4f5e69a053d7f7a635496 - Patch
References () https://git.kernel.org/stable/c/daf21394f9898fb9f0698c3e50de08132d2164e6 - () https://git.kernel.org/stable/c/daf21394f9898fb9f0698c3e50de08132d2164e6 - Patch
References () https://git.kernel.org/stable/c/edbb3226c985469a2f8eb69885055c9f5550f468 - () https://git.kernel.org/stable/c/edbb3226c985469a2f8eb69885055c9f5550f468 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory

21 Nov 2024, 09:20

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/17c2650de14842c25c569cbb2126c421489a3a24 - () https://git.kernel.org/stable/c/17c2650de14842c25c569cbb2126c421489a3a24 -
References () https://git.kernel.org/stable/c/4f1490a5d7a0472ee5d9f36547bc4ba46be755c7 - () https://git.kernel.org/stable/c/4f1490a5d7a0472ee5d9f36547bc4ba46be755c7 -
References () https://git.kernel.org/stable/c/610f20e5cf35ca9c0992693cae0dd8643ce932e7 - () https://git.kernel.org/stable/c/610f20e5cf35ca9c0992693cae0dd8643ce932e7 -
References () https://git.kernel.org/stable/c/87399f1ff92203d65f1febf5919429f4bb613a02 - () https://git.kernel.org/stable/c/87399f1ff92203d65f1febf5919429f4bb613a02 -
References () https://git.kernel.org/stable/c/8ba8db9786b55047df5ad3db3e01dd886687a77d - () https://git.kernel.org/stable/c/8ba8db9786b55047df5ad3db3e01dd886687a77d -
References () https://git.kernel.org/stable/c/b8505a1aee8f1edc9d16d72ae09c93de086e2a1a - () https://git.kernel.org/stable/c/b8505a1aee8f1edc9d16d72ae09c93de086e2a1a -
References () https://git.kernel.org/stable/c/c915c46a25c3efb084c4f5e69a053d7f7a635496 - () https://git.kernel.org/stable/c/c915c46a25c3efb084c4f5e69a053d7f7a635496 -
References () https://git.kernel.org/stable/c/daf21394f9898fb9f0698c3e50de08132d2164e6 - () https://git.kernel.org/stable/c/daf21394f9898fb9f0698c3e50de08132d2164e6 -
References () https://git.kernel.org/stable/c/edbb3226c985469a2f8eb69885055c9f5550f468 - () https://git.kernel.org/stable/c/edbb3226c985469a2f8eb69885055c9f5550f468 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: media: tc358743: registre el dispositivo asíncrono v4l2 solo después de una configuración exitosa Asegúrese de que el dispositivo se haya configurado correctamente antes de registrar el dispositivo asíncrono v4l2, permitiendo así el acceso al espacio de usuario.

17 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 14:15

Updated : 2025-12-17 19:23


NVD link : CVE-2024-35830

Mitre link : CVE-2024-35830

CVE.ORG link : CVE-2024-35830


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel