CVE-2024-45028

In the Linux kernel, the following vulnerability has been resolved: mmc: mmc_test: Fix NULL dereference on allocation failure If the "test->highmem = alloc_pages()" allocation fails then calling __free_pages(test->highmem) will result in a NULL dereference. Also change the error code to -ENOMEM instead of returning success.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*

History

13 Sep 2024, 16:29

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mmc: mmc_test: Se corrige la desreferencia NULL en caso de error de asignación. Si la asignación "test->highmem = alloc_pages()" falla, al llamar a __free_pages(test->highmem) se obtendrá una desreferencia NULL. Cambie también el código de error a -ENOMEM en lugar de devolver un resultado positivo.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/2b507b03991f44dfb202fc2a82c9874d1b1f0c06 - () https://git.kernel.org/stable/c/2b507b03991f44dfb202fc2a82c9874d1b1f0c06 - Patch
References () https://git.kernel.org/stable/c/3b4e76ceae5b5a46c968bd952f551ce173809f63 - () https://git.kernel.org/stable/c/3b4e76ceae5b5a46c968bd952f551ce173809f63 - Patch
References () https://git.kernel.org/stable/c/9b9ba386d7bfdbc38445932c90fa9444c0524bea - () https://git.kernel.org/stable/c/9b9ba386d7bfdbc38445932c90fa9444c0524bea - Patch
References () https://git.kernel.org/stable/c/a1e627af32ed60713941cbfc8075d44cad07f6dd - () https://git.kernel.org/stable/c/a1e627af32ed60713941cbfc8075d44cad07f6dd - Patch
References () https://git.kernel.org/stable/c/cac2815f49d343b2f0acc4973d2c14918ac3ab0c - () https://git.kernel.org/stable/c/cac2815f49d343b2f0acc4973d2c14918ac3ab0c - Patch
References () https://git.kernel.org/stable/c/e40515582141a9e7c84b269be699c05236a499a6 - () https://git.kernel.org/stable/c/e40515582141a9e7c84b269be699c05236a499a6 - Patch
References () https://git.kernel.org/stable/c/e97be13a9f51284da450dd2a592e3fa87b49cdc9 - () https://git.kernel.org/stable/c/e97be13a9f51284da450dd2a592e3fa87b49cdc9 - Patch
References () https://git.kernel.org/stable/c/ecb15b8ca12c0cbdab81e307e9795214d8b90890 - () https://git.kernel.org/stable/c/ecb15b8ca12c0cbdab81e307e9795214d8b90890 - Patch
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*

11 Sep 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-11 16:15

Updated : 2024-09-13 16:29


NVD link : CVE-2024-45028

Mitre link : CVE-2024-45028

CVE.ORG link : CVE-2024-45028


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference