First published: Fri Dec 27 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: gpio: grgpio: Add NULL check in grgpio_probe devm_kasprintf() can return a NULL pointer on failure,but this returned value in grgpio_probe is not checked. Add NULL check in grgpio_probe, to handle kernel NULL pointer dereference error.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.14<5.4.287 | |
Linux Kernel | >=5.5<5.10.231 | |
Linux Kernel | >=5.11<5.15.174 | |
Linux Kernel | >=5.16<6.1.120 | |
Linux Kernel | >=6.2<6.6.66 | |
Linux Kernel | >=6.7<6.12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56634 is categorized as a medium severity vulnerability in the Linux kernel.
CVE-2024-56634 can potentially lead to a NULL pointer dereference in the grgpio_probe function, causing system instability.
To fix CVE-2024-56634, update the Linux kernel to a version that includes the NULL check implemented in the grgpio_probe function.
CVE-2024-56634 affects Linux kernels from version 4.14 up to but not including versions 5.4.287, 5.5 to 5.10.231, 5.11 to 5.15.174, 5.16 to 6.1.120, 6.2 to 6.6.66, and 6.7 to 6.12.5.
There is no specific workaround for CVE-2024-56634; the recommended action is to update to a patched version of the Linux kernel.