Lucene search

K
nvd416baaa9-dc9f-4396-8d5f-8c081fb06d67NVD:CVE-2024-36890
HistoryMay 30, 2024 - 4:15 p.m.

CVE-2024-36890

2024-05-3016:15:12
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
linux
kernel
vulnerability
error
pointer
handling

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.6%

In the Linux kernel, the following vulnerability has been resolved:

mm/slab: make __free(kfree) accept error pointers

Currently, if an automatically freed allocation is an error pointer that
will lead to a crash. An example of this is in wm831x_gpio_dbg_show().

171 char *label __free(kfree) = gpiochip_dup_line_label(chip, i);
172 if (IS_ERR(label)) {
173 dev_err(wm831x->dev, “Failed to duplicate label\n”);
174 continue;
175 }

The auto clean up function should check for error pointers as well,
otherwise we’re going to keep hitting issues like this.

6.5 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.6%