CVE-2024-27037 — NULL Pointer Dereference in Linux
Severity
5.5MEDIUMNVD
OSV7.0OSV6.5
EPSS
0.0%
top 97.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 1
Latest updateJul 26
Description
In the Linux kernel, the following vulnerability has been resolved:
clk: zynq: Prevent null pointer dereference caused by kmalloc failure
The kmalloc() in zynq_clk_setup() will return null if the
physical memory has run out. As a result, if we use snprintf()
to write data to the null address, the null pointer dereference
bug will happen.
This patch uses a stack variable to replace the kmalloc().
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages9 packages
▶CVEListV5linux/linux0ee52b157b8ed88550ddd6291e54bb4bfabde364 — 01511ac7be8e45f80e637f6bf61af2d3d2dee9db+6
Patches
🔴Vulnerability Details
17📋Vendor Advisories
18💬Community
1Bugzilla▶
CVE-2024-27037 kernel: clk: zynq: Prevent null pointer dereference caused by kmalloc failure↗2024-05-01