CVE-2024-38575

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: pcie: handle randbuf allocation failure The kzalloc() in brcmf_pcie_download_fw_nvram() will return null if the physical memory has run out. As a result, if we use get_random_bytes() to generate random bytes in the randbuf, the null pointer dereference bug will happen. In order to prevent allocation failure, this patch adds a separate function using buffer on kernel stack to generate random bytes in the randbuf, which could prevent the kernel stack from overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Jan 2025, 16:01

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49 - () https://git.kernel.org/stable/c/0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49 - Patch
References () https://git.kernel.org/stable/c/316f790ebcf94bdf59f794b7cdea4068dc676d4c - () https://git.kernel.org/stable/c/316f790ebcf94bdf59f794b7cdea4068dc676d4c - Patch
References () https://git.kernel.org/stable/c/3729ca9e48d19a03ae049e2bde510e161c2f3720 - () https://git.kernel.org/stable/c/3729ca9e48d19a03ae049e2bde510e161c2f3720 - Patch
References () https://git.kernel.org/stable/c/7c15eb344b0d4d3468c9b2a7591ad2b859b29b88 - () https://git.kernel.org/stable/c/7c15eb344b0d4d3468c9b2a7591ad2b859b29b88 - Patch
References () https://git.kernel.org/stable/c/c37466406f075476c2702ecc01917928af871f3b - () https://git.kernel.org/stable/c/c37466406f075476c2702ecc01917928af871f3b - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49 - () https://git.kernel.org/stable/c/0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49 -
References () https://git.kernel.org/stable/c/316f790ebcf94bdf59f794b7cdea4068dc676d4c - () https://git.kernel.org/stable/c/316f790ebcf94bdf59f794b7cdea4068dc676d4c -
References () https://git.kernel.org/stable/c/3729ca9e48d19a03ae049e2bde510e161c2f3720 - () https://git.kernel.org/stable/c/3729ca9e48d19a03ae049e2bde510e161c2f3720 -
References () https://git.kernel.org/stable/c/7c15eb344b0d4d3468c9b2a7591ad2b859b29b88 - () https://git.kernel.org/stable/c/7c15eb344b0d4d3468c9b2a7591ad2b859b29b88 -
References () https://git.kernel.org/stable/c/c37466406f075476c2702ecc01917928af871f3b - () https://git.kernel.org/stable/c/c37466406f075476c2702ecc01917928af871f3b -

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: brcmfmac: pcie: manejar fallo de asignación de randbuf El kzalloc() en brcmf_pcie_download_fw_nvram() devolverá nulo si la memoria física se ha agotado. Como resultado, si usamos get_random_bytes() para generar bytes aleatorios en randbuf, se producirá el error de desreferencia del puntero nulo. Para evitar fallas en la asignación, este parche agrega una función separada que utiliza el búfer en la pila del kernel para generar bytes aleatorios en randbuf, lo que podría evitar que la pila del kernel se desborde.

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2025-01-31 16:01


NVD link : CVE-2024-38575

Mitre link : CVE-2024-38575

CVE.ORG link : CVE-2024-38575


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference