CVE-2024-46844

In the Linux kernel, the following vulnerability has been resolved: um: line: always fill *error_out in setup_one_line() The pointer isn't initialized by callers, but I have encountered cases where it's still printed; initialize it in all possible cases in setup_one_line().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

02 Oct 2024, 14:22

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/289979d64573f43df1d0e6bc6435de63a0d69cdf - () https://git.kernel.org/stable/c/289979d64573f43df1d0e6bc6435de63a0d69cdf - Patch
References () https://git.kernel.org/stable/c/3bedb7ce080690d0d6172db790790c1219bcbdd5 - () https://git.kernel.org/stable/c/3bedb7ce080690d0d6172db790790c1219bcbdd5 - Patch
References () https://git.kernel.org/stable/c/43f782c27907f306c664b6614fd6f264ac32cce6 - () https://git.kernel.org/stable/c/43f782c27907f306c664b6614fd6f264ac32cce6 - Patch
References () https://git.kernel.org/stable/c/824ac4a5edd3f7494ab1996826c4f47f8ef0f63d - () https://git.kernel.org/stable/c/824ac4a5edd3f7494ab1996826c4f47f8ef0f63d - Patch
References () https://git.kernel.org/stable/c/96301fdc2d533a196197c055af875fe33d47ef84 - () https://git.kernel.org/stable/c/96301fdc2d533a196197c055af875fe33d47ef84 - Patch
References () https://git.kernel.org/stable/c/c8944d449fda9f58c03bd99649b2df09948fc874 - () https://git.kernel.org/stable/c/c8944d449fda9f58c03bd99649b2df09948fc874 - Patch
References () https://git.kernel.org/stable/c/ec5b47a370177d79ae7773858042c107e21f8ecc - () https://git.kernel.org/stable/c/ec5b47a370177d79ae7773858042c107e21f8ecc - Patch
References () https://git.kernel.org/stable/c/fc843d3837ebcb1c16d3768ef3eb55e25d5331f2 - () https://git.kernel.org/stable/c/fc843d3837ebcb1c16d3768ef3eb55e25d5331f2 - Patch
CWE CWE-824
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

30 Sep 2024, 12:45

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: um: line: always fill *error_out in setup_one_line() El puntero no es inicializado por los llamadores, pero he encontrado casos en los que aún se imprime; inicialícelo en todos los casos posibles en setup_one_line().

27 Sep 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-27 13:15

Updated : 2024-10-02 14:22


NVD link : CVE-2024-46844

Mitre link : CVE-2024-46844

CVE.ORG link : CVE-2024-46844


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-824

Access of Uninitialized Pointer