In the Linux kernel, the following vulnerability has been resolved:
clk: zynq: Prevent null pointer dereference caused by kmalloc failure
The kmalloc() in zynq_clk_setup() will return null if the
physical memory has run out. As a result, if we use snprintf()
to write data to the null address, the null pointer dereference
bug will happen.
This patch uses a stack variable to replace the kmalloc().
References
Configurations
No configuration.
History
07 Nov 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
03 Jul 2024, 01:50
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-476 | |
Summary |
|
01 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 13:15
Updated : 2024-11-07 18:35
NVD link : CVE-2024-27037
Mitre link : CVE-2024-27037
CVE.ORG link : CVE-2024-27037
JSON object : View
Products Affected
No product.
CWE
CWE-476
NULL Pointer Dereference