SB2024111936 - NULL pointer dereference in Linux kernel soc stm
Published: November 19, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2024-50292)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the stm32_spdifrx_remove() function in sound/soc/stm/stm32_spdifrx.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/3a977b554f668382dfba31fd62e4cce4fe5643db
- https://git.kernel.org/stable/c/0d75f887aabd80cf37ea48d28f159afa7850ea28
- https://git.kernel.org/stable/c/4f1d74f74752eab8af6b8b28797dc6490d57374c
- https://git.kernel.org/stable/c/23bdbd1ef3e063e03d3c50c15a591b005ebbae39
- https://git.kernel.org/stable/c/22ae9321054cf7f36c537702af133659f51a0b88
- https://git.kernel.org/stable/c/9bb4af400c386374ab1047df44c508512c08c31f
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.230
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.172
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.117
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11.8
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.61