CVE-2024-27037

MEDIUM

Linux kernel - Memory Corruption

Title source: llm

Description

In the Linux kernel, the following vulnerability has been resolved: clk: zynq: Prevent null pointer dereference caused by kmalloc failure The kmalloc() in zynq_clk_setup() will return null if the physical memory has run out. As a result, if we use snprintf() to write data to the null address, the null pointer dereference bug will happen. This patch uses a stack variable to replace the kmalloc().

Scores

CVSS v3 5.5
EPSS 0.0001
EPSS Percentile 2.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Classification

CWE
CWE-476
Status published

Affected Products (6)

linux/linux_kernel < 5.15.153
linux/Kernel < 5.15.153linux
linux/Kernel < 6.1.83linux
linux/Kernel < 6.6.23linux
linux/Kernel < 6.7.11linux
linux/Kernel < 6.8.2linux

Timeline

Published May 01, 2024
Tracked Since Feb 18, 2026