In the Linux kernel, the following vulnerability has been resolved:
spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe
In function pci1xxxx_spi_probe, there is a potential null pointer that
may be caused by a failed memory allocation by the function devm_kzalloc.
Hence, a null pointer check needs to be added to prevent null pointer
dereferencing later in the code.
To fix this issue, spi_bus->spi_int[iter] should be checked. The memory
allocated by devm_kzalloc will be automatically released, so just directly
return -ENOMEM without worrying about memory leaks.
References
Configurations
Configuration 1 (hide)
|
History
07 Jan 2025, 17:03
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux
Linux linux Kernel |
|
CWE | CWE-476 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/1f886a7bfb3faf4c1021e73f045538008ce7634e - Patch | |
References | () https://git.kernel.org/stable/c/4b31a226097cf8cc3c9de5e855d97757fdb2bf06 - Patch | |
References | () https://git.kernel.org/stable/c/95e5d9eb26705a9a76d2ef8bcba9ee2e195d653d - Patch |
21 Nov 2024, 09:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1f886a7bfb3faf4c1021e73f045538008ce7634e - | |
References | () https://git.kernel.org/stable/c/4b31a226097cf8cc3c9de5e855d97757fdb2bf06 - | |
References | () https://git.kernel.org/stable/c/95e5d9eb26705a9a76d2ef8bcba9ee2e195d653d - | |
Summary |
|
20 May 2024, 13:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-19 09:15
Updated : 2025-01-07 17:03
NVD link : CVE-2024-35883
Mitre link : CVE-2024-35883
CVE.ORG link : CVE-2024-35883
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference