In the Linux kernel, the following vulnerability has been resolved:
greybus: lights: check return of get_channel_from_mode
If channel for the given node is not found we return null from
get_channel_from_mode. Make sure we validate the return pointer
before using it in two of the missing places.
This was originally reported in [0]:
Found by Linux Verification Center (linuxtesting.org) with SVACE.
[0] https://lore.kernel.org/all/20240301190425.120605-1-m.lobanov@rosalinux.ru
References
Configurations
Configuration 1 (hide)
|
History
17 Sep 2025, 17:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/330f6bcdcef03f70f81db5f2ed6747af656a09f2 - Patch | |
References | () https://git.kernel.org/stable/c/518e2c46b5dbce40b1aa0100001d03c3ceaa7d38 - Patch | |
References | () https://git.kernel.org/stable/c/895cdd9aa9546523df839f9cc1488a0ecc1e0731 - Patch | |
References | () https://git.kernel.org/stable/c/8f4a76d477f0cc3c54d512f07f6f88c8e1c1e07b - Patch | |
References | () https://git.kernel.org/stable/c/9b41a9b9c8be8c552f10633453fdb509e83b66f8 - Patch | |
References | () https://git.kernel.org/stable/c/a1ba19a1ae7cd1e324685ded4ab563e78fe68648 - Patch | |
References | () https://git.kernel.org/stable/c/e2c64246e5dc8c0d35ec41770b85e2b4cafdff21 - Patch | |
References | () https://git.kernel.org/stable/c/eac10cf3a97ffd4b4deb0a29f57c118225a42850 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-476 |
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/330f6bcdcef03f70f81db5f2ed6747af656a09f2 - | |
References | () https://git.kernel.org/stable/c/518e2c46b5dbce40b1aa0100001d03c3ceaa7d38 - | |
References | () https://git.kernel.org/stable/c/895cdd9aa9546523df839f9cc1488a0ecc1e0731 - | |
References | () https://git.kernel.org/stable/c/8f4a76d477f0cc3c54d512f07f6f88c8e1c1e07b - | |
References | () https://git.kernel.org/stable/c/9b41a9b9c8be8c552f10633453fdb509e83b66f8 - | |
References | () https://git.kernel.org/stable/c/a1ba19a1ae7cd1e324685ded4ab563e78fe68648 - | |
References | () https://git.kernel.org/stable/c/e2c64246e5dc8c0d35ec41770b85e2b4cafdff21 - | |
References | () https://git.kernel.org/stable/c/eac10cf3a97ffd4b4deb0a29f57c118225a42850 - |
15 Jul 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
21 Jun 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-21 11:15
Updated : 2025-09-17 17:00
NVD link : CVE-2024-38637
Mitre link : CVE-2024-38637
CVE.ORG link : CVE-2024-38637
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference