CVE-2024-56593NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
OSV8.8OSV7.8OSV4.7
EPSS
0.0%
top 99.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 27
Latest updateApr 13

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() This patch fixes a NULL pointer dereference bug in brcmfmac that occurs when a high 'sd_sgentry_align' value applies (e.g. 512) and a lot of queued SKBs are sent from the pkt queue. The problem is the number of entries in the pre-allocated sgtable, it is nents = max(rxglom_size, txglom_size) + max(rxglom_size, txglom_size) >> 4 + 1. Given the

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages10 packages

Patches

🔴Vulnerability Details

47
OSV
linux-azure, linux-azure-4.15 vulnerabilities2026-03-24
OSV
linux-azure vulnerabilities2026-03-24
OSV
linux-azure-fips vulnerabilities2026-03-24
OSV
linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle vulnerabilities2026-03-20
OSV
linux-aws-fips, linux-fips, linux-gcp-fips vulnerabilities2026-03-20

📋Vendor Advisories

48
Ubuntu
Kernel Live Patch Security Notice2026-04-13
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2026-03-24
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-24
Ubuntu
Linux kernel (Azure) vulnerabilities2026-03-24
Ubuntu
Linux kernel (FIPS) vulnerabilities2026-03-20