CVE-2024-26908

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

30 Apr 2024, 08:15

Type Values Removed Values Added
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : unknown
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: x86/xen: agregue alguna verificación de puntero nulo a smp.c kasprintf() devuelve un puntero a la memoria asignada dinámicamente que puede ser NULL en caso de falla. Asegúrese de que la asignación se haya realizado correctamente comprobando la validez del puntero.
Summary (en) In the Linux kernel, the following vulnerability has been resolved: x86/xen: Add some null pointer checking to smp.c kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the pointer validity. (en) Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
References
  • {'url': 'https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799', 'tags': ['Patch'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

29 Apr 2024, 19:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: x86/xen: agregue alguna verificación de puntero nulo a smp.c kasprintf() devuelve un puntero a la memoria asignada dinámicamente que puede ser NULL en caso de falla. Asegúrese de que la asignación se haya realizado correctamente comprobando la validez del puntero.
CWE CWE-476
References () https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc - () https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc - Patch
References () https://git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2 - () https://git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2 - Patch
References () https://git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165 - () https://git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165 - Patch
References () https://git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa - () https://git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa - Patch
References () https://git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4 - () https://git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4 - Patch
References () https://git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af - () https://git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af - Patch
References () https://git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750 - () https://git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750 - Patch
References () https://git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799 - () https://git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

17 Apr 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 11:15

Updated : 2024-04-30 08:15


NVD link : CVE-2024-26908

Mitre link : CVE-2024-26908

CVE.ORG link : CVE-2024-26908


JSON object : View

Products Affected

No product.

CWE

No CWE.