Bug 2273238 (CVE-2024-26771) - CVE-2024-26771 kernel: dmaengine: ti: edma: Add some null pointer checks to the edma_probe
Summary: CVE-2024-26771 kernel: dmaengine: ti: edma: Add some null pointer checks to t...
Keywords:
Status: NEW
Alias: CVE-2024-26771
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2273239
Blocks: 2273182
TreeView+ depends on / blocked
 
Reported: 2024-04-04 00:52 UTC by Robb Gatica
Modified: 2024-09-19 21:09 UTC (History)
50 users (show)

Fixed In Version: kernel 5.10.211, kernel 5.15.150, kernel 6.1.80, kernel 6.6.19, kernel 6.7.7, kernel 6.8
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in the devm_kasprintf() function in the Enhanced Direct Memory Access (TI EDMA) driver in the Linux kernel, which returns a pointer to dynamically allocated memory. This pointer could return NULL if the function fails, which could result in crashes or undefined behavior.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Robb Gatica 2024-04-04 00:52:50 UTC
In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: edma: Add some null pointer checks to the edma_probe

The Linux kernel CVE team has assigned CVE-2024-26771 to this issue.

Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024040307-CVE-2024-26771-b6de@gregkh/T

Comment 1 Robb Gatica 2024-04-04 00:53:26 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2273239]


Note You need to log in before you can comment on or make changes to this bug.