First published: Sat Jan 11 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: power: supply: gpio-charger: Fix set charge current limits Fix set charge current limits for devices which allow to set the lowest charge current limit to be greater zero. If requested charge current limit is below lowest limit, the index equals current_limit_map_size which leads to accessing memory beyond allocated memory.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | <=5.10.223-1 | 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57792 has been classified as a moderate severity vulnerability affecting the Linux kernel.
To fix CVE-2024-57792, update to the patched versions of the Linux kernel, specifically 5.10.234-1, 6.1.129-1, 6.1.128-1, 6.12.19-1, or 6.12.20-1.
CVE-2024-57792 affects Linux kernel versions up to 5.10.223-1 and versions up to 6.1.128-1~deb11u1.
CVE-2024-57792 impacts the functionality of charge current limit settings in devices managed by the GPIO charger in the Linux kernel.
There is no specific workaround for CVE-2024-57792; the recommended action is to apply the available updates to mitigate the vulnerability.