### [CVE-2024-56705](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56705) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.12%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=a49d25364dfb9f8a64037488a39ab1f56c5fa419%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=ad85094b293e40e7a2f831b0311a389d952ebd5e%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:media: atomisp: Add check for rgby_data memory allocation failureIn ia_css_3a_statistics_allocate(), there is no check on the allocationresult of the rgby_data memory. If rgby_data is not successfullyallocated, it may trigger the assert(host_stats->rgby_data) assertion inia_css_s3a_hmem_decode(). Adding a check to fix this potential issue. ### POC #### Reference - https://git.kernel.org/stable/c/0c25ab93f2878cab07d37ca5afd302283201e5af #### Github - https://github.com/cku-heise/euvd-api-doc - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/w4zu/Debian_security