### [CVE-2024-56620](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56620) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=519b6274a7775f5fe00a086f189efb8f063467d1%3C%20f16a097047e38dcdd169a15e3eed1b2f2147a2e7%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In the Linux kernel, the following vulnerability has been resolved:scsi: ufs: qcom: Only free platform MSIs when ESI is enabledOtherwise, it will result in a NULL pointer dereference as below:Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008Call trace: mutex_lock+0xc/0x54 platform_device_msi_free_irqs_all+0x14/0x20 ufs_qcom_remove+0x34/0x48 [ufs_qcom] platform_remove+0x28/0x44 device_remove+0x4c/0x80 device_release_driver_internal+0xd8/0x178 driver_detach+0x50/0x9c bus_remove_driver+0x6c/0xbc driver_unregister+0x30/0x60 platform_driver_unregister+0x14/0x20 ufs_qcom_pltform_exit+0x18/0xb94 [ufs_qcom] __arm64_sys_delete_module+0x180/0x260 invoke_syscall+0x44/0x100 el0_svc_common.constprop.0+0xc0/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x34/0xdc el0t_64_sync_handler+0xc0/0xc4 el0t_64_sync+0x190/0x194 ### POC #### Reference No PoCs from references. #### Github - https://github.com/cku-heise/euvd-api-doc