First published: Tue Nov 05 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() A devm_kzalloc() in asoc_qcom_lpass_cpu_platform_probe() could possibly return NULL pointer. NULL Pointer Dereference may be triggerred without addtional check. Add a NULL check for the returned pointer.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.10<5.15.170 | |
Linux Kernel | >=5.16<6.1.115 | |
Linux Kernel | >=6.2<6.6.59 | |
Linux Kernel | >=6.7<6.11.6 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50103 is classified as a medium severity vulnerability due to the potential for a NULL pointer dereference.
To fix CVE-2024-50103, update to the latest version of the Linux kernel that addresses the vulnerability.
CVE-2024-50103 is caused by a possible NULL pointer dereference in the asoc_qcom_lpass_cpu_platform_probe() function of the Linux kernel.
CVE-2024-50103 affects multiple versions of the Linux kernel ranging from 5.10 to 6.12-rc4.
No, CVE-2024-50103 is not a zero-day vulnerability as it has already been identified and fixed in newer kernel releases.