First published: Fri Dec 27 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ASoC: imx-audmix: Add NULL check in imx_audmix_probe devm_kasprintf() can return a NULL pointer on failure,but this returned value in imx_audmix_probe() is not checked. Add NULL check in imx_audmix_probe(), to handle kernel NULL pointer dereference error.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.11<6.11.11 | |
Linux Kernel | >=6.12<6.12.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53199 has a moderate severity rating due to the potential for a NULL pointer dereference in the Linux kernel.
To fix CVE-2024-53199, update your Linux kernel to a patched version such as 5.10.223-1 or later, or 6.12.15-1 or later.
CVE-2024-53199 affects Linux kernel versions between 6.11 and 6.12.2, along with specific versions within that range.
CVE-2024-53199 impacts the ASoC (ALSA System on Chip) framework specifically related to the imx-audmix driver.
If exploited, CVE-2024-53199 could lead to system instability or potential denial of service due to a NULL pointer dereference.