CVE-2024-56767

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-56767
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56767.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56767
Downstream
Related
Published
2025-01-06T16:20:45.430Z
Modified
2025-11-28T02:35:01.026586Z
Summary
dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset
Details

In the Linux kernel, the following vulnerability has been resolved:

dmaengine: atxdmac: avoid nullprtderef in atxdmacprepdma_memset

The atxdmacmemsetcreatedesc may return NULL, which will lead to a null pointer dereference. For example, the len input is error, or the atchan->freedescslist is empty and memory is exhausted. Therefore, add check to avoid this.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56767.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b206d9a23ac71cb905f5fb6e0cd813406f89b678
Fixed
3d229600c54e9e0909080ecaf1aab0642aefa5f0
Fixed
ed1a8aaa344522c0c349ac9042db27ad130ef913
Fixed
8d364597de9ce2a5f52714224bfe6c2e7a29b303
Fixed
fdba6d5e455388377ec7e82a5913ddfcc7edd93b
Fixed
e658f1c133b854b2ae799147301d82dddb8f3162
Fixed
54376d8d26596f98ed7432a788314bb9154bf3e3
Fixed
c43ec96e8d34399bd9dab2f2dc316b904892133f

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.2.0
Fixed
5.4.289
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.233
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.176
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.123
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.69
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.8