CVE-2024-35943

In the Linux kernel, the following vulnerability has been resolved: pmdomain: ti: Add a null pointer check to the omap_prm_domain_init devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the pointer validity.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Nov 2025, 22:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html -

03 Nov 2025, 20:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -

23 Sep 2025, 16:03

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/04f23510daa40f9010fadf309507564a34ad956f - () https://git.kernel.org/stable/c/04f23510daa40f9010fadf309507564a34ad956f - Patch
References () https://git.kernel.org/stable/c/5d7f58ee08434a33340f75ac7ac5071eea9673b3 - () https://git.kernel.org/stable/c/5d7f58ee08434a33340f75ac7ac5071eea9673b3 - Patch
References () https://git.kernel.org/stable/c/984212fa6b4bc6d9ed58f5b0838e8d5af7679ce5 - () https://git.kernel.org/stable/c/984212fa6b4bc6d9ed58f5b0838e8d5af7679ce5 - Patch
References () https://git.kernel.org/stable/c/bc08f5ab11b1881b85371f0bd9c9a3d27f65cca8 - () https://git.kernel.org/stable/c/bc08f5ab11b1881b85371f0bd9c9a3d27f65cca8 - Patch
References () https://git.kernel.org/stable/c/ce666cecc09c0f92d5f86d89d8068ecfcf723a7e - () https://git.kernel.org/stable/c/ce666cecc09c0f92d5f86d89d8068ecfcf723a7e - Patch
References () https://git.kernel.org/stable/c/e65f7eb117e1b44742212d65784236269085e736 - () https://git.kernel.org/stable/c/e65f7eb117e1b44742212d65784236269085e736 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

02 May 2025, 07:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/984212fa6b4bc6d9ed58f5b0838e8d5af7679ce5 -
  • () https://git.kernel.org/stable/c/e65f7eb117e1b44742212d65784236269085e736 -

21 Nov 2024, 09:21

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/04f23510daa40f9010fadf309507564a34ad956f - () https://git.kernel.org/stable/c/04f23510daa40f9010fadf309507564a34ad956f -
References () https://git.kernel.org/stable/c/5d7f58ee08434a33340f75ac7ac5071eea9673b3 - () https://git.kernel.org/stable/c/5d7f58ee08434a33340f75ac7ac5071eea9673b3 -
References () https://git.kernel.org/stable/c/ce666cecc09c0f92d5f86d89d8068ecfcf723a7e - () https://git.kernel.org/stable/c/ce666cecc09c0f92d5f86d89d8068ecfcf723a7e -

18 Sep 2024, 18:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/bc08f5ab11b1881b85371f0bd9c9a3d27f65cca8 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: pmdomain: ti: agregue una verificación de puntero null a omap_prm_domain_init devm_kasprintf() devuelve un puntero a la memoria asignada dinámicamente que puede ser NULL en caso de fallo. Asegúrese de que la asignación haya sido exitosa verificando la validez del puntero.

19 May 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-19 11:15

Updated : 2025-11-03 22:16


NVD link : CVE-2024-35943

Mitre link : CVE-2024-35943

CVE.ORG link : CVE-2024-35943


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference