Updated: 2024-11-04 15:42:26.168116
Description:
In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: Add NULL check in BE reparenting Add NULL check in dpcm_be_reparent API, to handle kernel NULL pointer dereference error. The issue occurred in fuzzing test.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | 0 | |
CVSS Version 3.x | MEDIUM | 5.5 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
CentOS 6 ELS | kernel | 2.6.32 | 5.5 | MEDIUM | Ignored | 2024-11-05 04:30:06 | ||
CentOS 8.4 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Needs Triage | 2024-11-14 23:12:40 | ||
CentOS 8.5 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Needs Triage | 2024-11-14 23:12:40 | ||
CentOS Stream 8 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Needs Triage | 2025-01-23 14:24:36 | ||
CloudLinux 6 ELS | kernel | 2.6.32 | 5.5 | MEDIUM | Ignored | 2024-11-05 04:30:06 | ||
Oracle Linux 6 ELS | kernel | 2.6.32 | 5.5 | MEDIUM | Ignored | 2024-11-05 04:30:05 | ||
Ubuntu 16.04 ELS | linux | 4.4.0 | 5.5 | MEDIUM | Ignored | 2024-11-05 04:31:14 | ||
Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 5.5 | MEDIUM | Ignored | 2024-11-05 06:54:16 |