CVE-2024-36014

In the Linux kernel, the following vulnerability has been resolved: drm/arm/malidp: fix a possible null pointer dereference In malidp_mw_connector_reset, new memory is allocated with kzalloc, but no check is performed. In order to prevent null pointer dereferencing, ensure that mw_state is checked before calling __drm_atomic_helper_connector_reset.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Jan 2025, 21:41

Type Values Removed Values Added
CWE CWE-476
References () https://git.kernel.org/stable/c/335cc45ef2b81b68be63c698b4f867a530bdf7a5 - () https://git.kernel.org/stable/c/335cc45ef2b81b68be63c698b4f867a530bdf7a5 - Patch
References () https://git.kernel.org/stable/c/3e54d4e95120641216dfe91a6c49f116a9f68490 - () https://git.kernel.org/stable/c/3e54d4e95120641216dfe91a6c49f116a9f68490 - Patch
References () https://git.kernel.org/stable/c/565d9ad7e5a18eb69ed8b66a9e9bb3f45346520c - () https://git.kernel.org/stable/c/565d9ad7e5a18eb69ed8b66a9e9bb3f45346520c - Patch
References () https://git.kernel.org/stable/c/93f76ec1eddce60dbb5885cbc0d7df54adee4639 - () https://git.kernel.org/stable/c/93f76ec1eddce60dbb5885cbc0d7df54adee4639 - Patch
References () https://git.kernel.org/stable/c/a1f95aede6285dba6dd036d907196f35ae3a11ea - () https://git.kernel.org/stable/c/a1f95aede6285dba6dd036d907196f35ae3a11ea - Patch
References () https://git.kernel.org/stable/c/a5fa5b40a278a3ca978fed64707bd27614adb1eb - () https://git.kernel.org/stable/c/a5fa5b40a278a3ca978fed64707bd27614adb1eb - Patch
References () https://git.kernel.org/stable/c/b6cc5dd06336ed8bb3a7a1fc5aaf7d5e88bc0818 - () https://git.kernel.org/stable/c/b6cc5dd06336ed8bb3a7a1fc5aaf7d5e88bc0818 - Patch
References () https://git.kernel.org/stable/c/b77620730f614059db2470e8ebab3e725280fc6d - () https://git.kernel.org/stable/c/b77620730f614059db2470e8ebab3e725280fc6d - Patch
References () https://git.kernel.org/stable/c/e4b52d49383306ef73fd1bd9102538beebb0fe07 - () https://git.kernel.org/stable/c/e4b52d49383306ef73fd1bd9102538beebb0fe07 - Patch
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 09:21

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/335cc45ef2b81b68be63c698b4f867a530bdf7a5 - () https://git.kernel.org/stable/c/335cc45ef2b81b68be63c698b4f867a530bdf7a5 -
References () https://git.kernel.org/stable/c/3e54d4e95120641216dfe91a6c49f116a9f68490 - () https://git.kernel.org/stable/c/3e54d4e95120641216dfe91a6c49f116a9f68490 -
References () https://git.kernel.org/stable/c/565d9ad7e5a18eb69ed8b66a9e9bb3f45346520c - () https://git.kernel.org/stable/c/565d9ad7e5a18eb69ed8b66a9e9bb3f45346520c -
References () https://git.kernel.org/stable/c/93f76ec1eddce60dbb5885cbc0d7df54adee4639 - () https://git.kernel.org/stable/c/93f76ec1eddce60dbb5885cbc0d7df54adee4639 -
References () https://git.kernel.org/stable/c/a1f95aede6285dba6dd036d907196f35ae3a11ea - () https://git.kernel.org/stable/c/a1f95aede6285dba6dd036d907196f35ae3a11ea -
References () https://git.kernel.org/stable/c/a5fa5b40a278a3ca978fed64707bd27614adb1eb - () https://git.kernel.org/stable/c/a5fa5b40a278a3ca978fed64707bd27614adb1eb -
References () https://git.kernel.org/stable/c/b6cc5dd06336ed8bb3a7a1fc5aaf7d5e88bc0818 - () https://git.kernel.org/stable/c/b6cc5dd06336ed8bb3a7a1fc5aaf7d5e88bc0818 -
References () https://git.kernel.org/stable/c/b77620730f614059db2470e8ebab3e725280fc6d - () https://git.kernel.org/stable/c/b77620730f614059db2470e8ebab3e725280fc6d -
References () https://git.kernel.org/stable/c/e4b52d49383306ef73fd1bd9102538beebb0fe07 - () https://git.kernel.org/stable/c/e4b52d49383306ef73fd1bd9102538beebb0fe07 -

15 Jul 2024, 07:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

16 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3e54d4e95120641216dfe91a6c49f116a9f68490 -
  • () https://git.kernel.org/stable/c/565d9ad7e5a18eb69ed8b66a9e9bb3f45346520c -
  • () https://git.kernel.org/stable/c/a5fa5b40a278a3ca978fed64707bd27614adb1eb -
  • () https://git.kernel.org/stable/c/b6cc5dd06336ed8bb3a7a1fc5aaf7d5e88bc0818 -

12 Jun 2024, 10:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/335cc45ef2b81b68be63c698b4f867a530bdf7a5 -
  • () https://git.kernel.org/stable/c/e4b52d49383306ef73fd1bd9102538beebb0fe07 -

30 May 2024, 10:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/93f76ec1eddce60dbb5885cbc0d7df54adee4639 -
  • () https://git.kernel.org/stable/c/b77620730f614059db2470e8ebab3e725280fc6d -

29 May 2024, 13:02

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/arm/malidp: corrige una posible desreferencia del puntero nulo En malidp_mw_connector_reset, se asigna nueva memoria con kzalloc, pero no se realiza ninguna verificación. Para evitar la desreferenciación del puntero nulo, asegúrese de que mw_state esté marcado antes de llamar a __drm_atomic_helper_connector_reset.

29 May 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-29 07:15

Updated : 2025-01-06 21:41


NVD link : CVE-2024-36014

Mitre link : CVE-2024-36014

CVE.ORG link : CVE-2024-36014


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference