CVE-2024-26771
Published: April 4, 2024Last modified: April 4, 2024
Description
In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: edma: Add some null pointer checks to the edma_probe devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the pointer validity.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5.5 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.81-r0) |
| 25 LTS | linux-lts | Fixed (6.12.41-r0) | |
| Stream | linux-lts | Fixed (6.12.41-r0) |
References
- https://git.kernel.org/stable/c/4fe4e5adc7d29d214c59b59f61db73dec505ca3d
- https://git.kernel.org/stable/c/6e2276203ac9ff10fc76917ec9813c660f627369
- https://git.kernel.org/stable/c/7b24760f3a3c7ae1a176d343136b6c25174b7b27
- https://git.kernel.org/stable/c/9d508c897153ae8dd79303f7f035f078139f6b49
- https://git.kernel.org/stable/c/c432094aa7c9970f2fa10d2305d550d3810657ce
- https://git.kernel.org/stable/c/f2a5e30d1e9a629de6179fa23923a318d5feb29e
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html