CVE-2024-40973Unchecked Return Value in Kernel

Severity
5.5MEDIUMNVD
OSV8.8
EPSS
0.0%
top 96.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 12
Latest updateJan 27

Description

In the Linux kernel, the following vulnerability has been resolved: media: mtk-vcodec: potential null pointer deference in SCP The return value of devm_kzalloc() needs to be checked to avoid NULL pointer deference. This is similar to CVE-2022-3113.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages8 packages

NVDlinux/linux_kernel6.76.9.7+1
Debianlinux/linux_kernel< 6.1.133-1+2
Ubuntulinux/linux_kernel< 5.15.0-130.140+1
debiandebian/linux< linux 6.1.133-1 (bookworm)
debiandebian/linux-6.1< linux 6.1.133-1 (bookworm)

Patches

🔴Vulnerability Details

16
OSV
linux-xilinx-zynqmp vulnerabilities2025-01-27
OSV
linux-azure, linux-intel-iotg-5.15 vulnerabilities2025-01-09
OSV
linux-azure-5.15 vulnerabilities2025-01-09
OSV
linux-gke vulnerabilities2025-01-07
OSV
linux-intel-iotg vulnerabilities2025-01-06

📋Vendor Advisories

17
Ubuntu
Linux kernel (Xilinx ZynqMP) vulnerabilities2025-01-27
Ubuntu
Linux kernel vulnerabilities2025-01-09
Ubuntu
Linux kernel (Azure) vulnerabilities2025-01-09
Ubuntu
Linux kernel (GKE) vulnerabilities2025-01-07
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2025-01-06