First published: Wed May 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: clk: zynq: Prevent null pointer dereference caused by kmalloc failure The kmalloc() in zynq_clk_setup() will return null if the physical memory has run out. As a result, if we use snprintf() to write data to the null address, the null pointer dereference bug will happen. This patch uses a stack variable to replace the kmalloc().
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27037 is considered a moderate severity vulnerability due to the risk of null pointer dereference that could lead to denial of service.
To fix CVE-2024-27037, update your Linux kernel to one of the patched versions, namely 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1.
CVE-2024-27037 affects certain versions of the Linux kernel prior to the specified patched releases.
CVE-2024-27037 is caused by the kmalloc() function returning null due to insufficient physical memory, leading to a potential null pointer dereference.
As of now, there is no public indication that CVE-2024-27037 is being actively exploited in the wild.