CVE-2024-27037
MEDIUMLinux kernel - Memory Corruption
Title source: llmDescription
In the Linux kernel, the following vulnerability has been resolved: clk: zynq: Prevent null pointer dereference caused by kmalloc failure The kmalloc() in zynq_clk_setup() will return null if the physical memory has run out. As a result, if we use snprintf() to write data to the null address, the null pointer dereference bug will happen. This patch uses a stack variable to replace the kmalloc().
References (6)
Scores
CVSS v3
5.5
EPSS
0.0001
EPSS Percentile
2.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Classification
CWE
CWE-476
Status
published
Affected Products (6)
linux/linux_kernel
< 5.15.153
linux/Kernel
< 5.15.153linux
linux/Kernel
< 6.1.83linux
linux/Kernel
< 6.6.23linux
linux/Kernel
< 6.7.11linux
linux/Kernel
< 6.8.2linux
Timeline
Published
May 01, 2024
Tracked Since
Feb 18, 2026