In the Linux kernel, the following vulnerability has been resolved:
gpio: grgpio: Add NULL check in grgpio_probe
devm_kasprintf() can return a NULL pointer on failure,but this
returned value in grgpio_probe is not checked.
Add NULL check in grgpio_probe, to handle kernel NULL
pointer dereference error.
References
Configurations
Configuration 1 (hide)
|
History
08 Jan 2025, 16:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-476 | |
Summary |
|
|
References | () https://git.kernel.org/stable/c/050b23d081da0f29474de043e9538c1f7a351b3b - Patch | |
References | () https://git.kernel.org/stable/c/09adf8792b61c09ae543972a1ece1884ef773848 - Patch | |
References | () https://git.kernel.org/stable/c/4733f68e59bb7b9e3d395699abb18366954b9ba7 - Patch | |
References | () https://git.kernel.org/stable/c/53ff0caa6ad57372d426b4f48fc0f66df43a731f - Patch | |
References | () https://git.kernel.org/stable/c/8d2ca6ac3711a4f4015d26b7cc84f325ac608edb - Patch | |
References | () https://git.kernel.org/stable/c/ad4dfa7ea7f5f7e9a3c78627cfc749bc7005ca7a - Patch | |
References | () https://git.kernel.org/stable/c/db2fc255fcf41f536ac8666409849e11659af88d - Patch |
27 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-27 15:15
Updated : 2025-01-08 16:45
NVD link : CVE-2024-56634
Mitre link : CVE-2024-56634
CVE.ORG link : CVE-2024-56634
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference