CVE-2024-27051

In the Linux kernel, the following vulnerability has been resolved: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value cpufreq_cpu_get may return NULL. To avoid NULL-dereference check it and return 0 in case of error. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Dec 2024, 19:11

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-476
References () https://git.kernel.org/stable/c/74b84d0d71180330efe67c82f973a87f828323e5 - () https://git.kernel.org/stable/c/74b84d0d71180330efe67c82f973a87f828323e5 - Patch
References () https://git.kernel.org/stable/c/9127599c075caff234359950117018a010dd01db - () https://git.kernel.org/stable/c/9127599c075caff234359950117018a010dd01db - Patch
References () https://git.kernel.org/stable/c/b25b64a241d769e932a022e5c780cf135ef56035 - () https://git.kernel.org/stable/c/b25b64a241d769e932a022e5c780cf135ef56035 - Patch
References () https://git.kernel.org/stable/c/d951cf510fb0df91d3abac0121a59ebbc63c0567 - () https://git.kernel.org/stable/c/d951cf510fb0df91d3abac0121a59ebbc63c0567 - Patch
References () https://git.kernel.org/stable/c/e6e3e51ffba0784782b1a076d7441605697ea3c6 - () https://git.kernel.org/stable/c/e6e3e51ffba0784782b1a076d7441605697ea3c6 - Patch
References () https://git.kernel.org/stable/c/e72160cb6e23b78b41999d6885a34ce8db536095 - () https://git.kernel.org/stable/c/e72160cb6e23b78b41999d6885a34ce8db536095 - Patch
References () https://git.kernel.org/stable/c/f661017e6d326ee187db24194cabb013d81bc2a6 - () https://git.kernel.org/stable/c/f661017e6d326ee187db24194cabb013d81bc2a6 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/74b84d0d71180330efe67c82f973a87f828323e5 - () https://git.kernel.org/stable/c/74b84d0d71180330efe67c82f973a87f828323e5 -
References () https://git.kernel.org/stable/c/9127599c075caff234359950117018a010dd01db - () https://git.kernel.org/stable/c/9127599c075caff234359950117018a010dd01db -
References () https://git.kernel.org/stable/c/b25b64a241d769e932a022e5c780cf135ef56035 - () https://git.kernel.org/stable/c/b25b64a241d769e932a022e5c780cf135ef56035 -
References () https://git.kernel.org/stable/c/d951cf510fb0df91d3abac0121a59ebbc63c0567 - () https://git.kernel.org/stable/c/d951cf510fb0df91d3abac0121a59ebbc63c0567 -
References () https://git.kernel.org/stable/c/e6e3e51ffba0784782b1a076d7441605697ea3c6 - () https://git.kernel.org/stable/c/e6e3e51ffba0784782b1a076d7441605697ea3c6 -
References () https://git.kernel.org/stable/c/e72160cb6e23b78b41999d6885a34ce8db536095 - () https://git.kernel.org/stable/c/e72160cb6e23b78b41999d6885a34ce8db536095 -
References () https://git.kernel.org/stable/c/f661017e6d326ee187db24194cabb013d81bc2a6 - () https://git.kernel.org/stable/c/f661017e6d326ee187db24194cabb013d81bc2a6 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 22:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: cpufreq: brcmstb-avs-cpufreq: agregar verificación para el valor de retorno de cpufreq_cpu_get cpufreq_cpu_get puede devolver NULL. Para evitar la desreferencia NULL, verifíquelo y devuelva 0 en caso de error. Encontrado por el Centro de verificación de Linux (linuxtesting.org) con SVACE.
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

01 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 13:15

Updated : 2024-12-23 19:11


NVD link : CVE-2024-27051

Mitre link : CVE-2024-27051

CVE.ORG link : CVE-2024-27051


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference