CVE-2024-38637
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/06/2024
Last modified:
04/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
greybus: lights: check return of get_channel_from_mode<br />
<br />
If channel for the given node is not found we return null from<br />
get_channel_from_mode. Make sure we validate the return pointer<br />
before using it in two of the missing places.<br />
<br />
This was originally reported in [0]:<br />
Found by Linux Verification Center (linuxtesting.org) with SVACE.<br />
<br />
[0] https://lore.kernel.org/all/20240301190425.120605-1-m.lobanov@rosalinux.ru
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9 (including) | 4.19.316 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.278 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.219 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.161 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.93 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/330f6bcdcef03f70f81db5f2ed6747af656a09f2
- https://git.kernel.org/stable/c/518e2c46b5dbce40b1aa0100001d03c3ceaa7d38
- https://git.kernel.org/stable/c/895cdd9aa9546523df839f9cc1488a0ecc1e0731
- https://git.kernel.org/stable/c/8f4a76d477f0cc3c54d512f07f6f88c8e1c1e07b
- https://git.kernel.org/stable/c/9b41a9b9c8be8c552f10633453fdb509e83b66f8
- https://git.kernel.org/stable/c/a1ba19a1ae7cd1e324685ded4ab563e78fe68648
- https://git.kernel.org/stable/c/e2c64246e5dc8c0d35ec41770b85e2b4cafdff21
- https://git.kernel.org/stable/c/eac10cf3a97ffd4b4deb0a29f57c118225a42850
- https://git.kernel.org/stable/c/330f6bcdcef03f70f81db5f2ed6747af656a09f2
- https://git.kernel.org/stable/c/518e2c46b5dbce40b1aa0100001d03c3ceaa7d38
- https://git.kernel.org/stable/c/895cdd9aa9546523df839f9cc1488a0ecc1e0731
- https://git.kernel.org/stable/c/8f4a76d477f0cc3c54d512f07f6f88c8e1c1e07b
- https://git.kernel.org/stable/c/9b41a9b9c8be8c552f10633453fdb509e83b66f8
- https://git.kernel.org/stable/c/a1ba19a1ae7cd1e324685ded4ab563e78fe68648
- https://git.kernel.org/stable/c/e2c64246e5dc8c0d35ec41770b85e2b4cafdff21
- https://git.kernel.org/stable/c/eac10cf3a97ffd4b4deb0a29f57c118225a42850
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html



