In the Linux kernel, the following vulnerability has been resolved:
x86/xen: Add some null pointer checking to smp.c
kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2 (6.8-rc5)
git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc
git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2
git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165
git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa
git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4
git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af
git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750
git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799
launchpad.net/bugs/cve/CVE-2024-26908
nvd.nist.gov/vuln/detail/CVE-2024-26908
security-tracker.debian.org/tracker/CVE-2024-26908
www.cve.org/CVERecord?id=CVE-2024-26908