← Voltar para CVEs
CVE-2024-26771
MEDIUM5.5
Descricao
In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: edma: Add some null pointer checks to the edma_probe devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the pointer validity.
Detalhes CVE
Pontuacao CVSS v3.15.5
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado4/3/2024
Ultima modificacao1/27/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
debian:debian_linuxlinux:linux_kernel
Fraquezas (CWE)
CWE-476
Referencias
https://git.kernel.org/stable/c/4fe4e5adc7d29d214c59b59f61db73dec505ca3d(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/6e2276203ac9ff10fc76917ec9813c660f627369(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/7b24760f3a3c7ae1a176d343136b6c25174b7b27(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/9d508c897153ae8dd79303f7f035f078139f6b49(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/c432094aa7c9970f2fa10d2305d550d3810657ce(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/f2a5e30d1e9a629de6179fa23923a318d5feb29e(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/4fe4e5adc7d29d214c59b59f61db73dec505ca3d(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/6e2276203ac9ff10fc76917ec9813c660f627369(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/7b24760f3a3c7ae1a176d343136b6c25174b7b27(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/9d508c897153ae8dd79303f7f035f078139f6b49(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/c432094aa7c9970f2fa10d2305d550d3810657ce(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/f2a5e30d1e9a629de6179fa23923a318d5feb29e(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.