CVE-2024-50057Release of Invalid Pointer or Reference in Linux

Severity
3.3LOWNVD
OSV8.8OSV5.5
EPSS
0.0%
top 96.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 21
Latest updateMay 26

Description

In the Linux kernel, the following vulnerability has been resolved: usb: typec: tipd: Free IRQ only if it was requested before In polling mode, if no IRQ was requested there is no need to free it. Call devm_free_irq() only if client->irq is set. This fixes the warning caused by the tps6598x module removal: WARNING: CPU: 2 PID: 333 at kernel/irq/devres.c:144 devm_free_irq+0x80/0x8c ... ... Call trace: devm_free_irq+0x80/0x8c tps6598x_remove+0x28/0x88 [tps6598x] i2c_device_remove+0x2c/0x9c devi

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LExploitability: 1.8 | Impact: 1.4

Affected Packages12 packages

Patches

🔴Vulnerability Details

16
OSV
linux-raspi vulnerabilities2025-05-26
OSV
linux-raspi-realtime vulnerabilities2025-05-20
OSV
linux-azure-nvidia vulnerabilities2025-04-28
OSV
linux-aws-6.8 vulnerabilities2025-04-23
OSV
linux-azure-6.8 vulnerabilities2025-04-01

📋Vendor Advisories

17
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-05-26
Ubuntu
Linux kernel (Raspberry Pi Real-time) vulnerabilities2025-05-20
Ubuntu
Linux kernel (Azure, N-Series) vulnerabilities2025-04-28
Ubuntu
Linux kernel vulnerabilities2025-04-23
Ubuntu
Linux kernel (Azure) vulnerabilities2025-04-01