In the Linux kernel, the following vulnerability has been resolved:
dmaengine: ti: edma: Add some null pointer checks to the edma_probe
devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the pointer validity.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/dma/ti/edma.c" }, "deprecated": false, "digest": { "line_hashes": [ "39976870994884971095853915385313232606", "158687164681712763902305531255890510516", "11799680974454823067211378153820545307", "27441851347895680306540149871943443748", "306621189897545271164266278940116169906", "224818983226224668315760798631631433297", "55599194368602570291527299964174240597", "38005699160580351063127852505190928808" ], "threshold": 0.9 }, "id": "CVE-2024-26771-31c7c558", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7b24760f3a3c7ae1a176d343136b6c25174b7b27" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/dma/ti/edma.c" }, "deprecated": false, "digest": { "line_hashes": [ "39976870994884971095853915385313232606", "158687164681712763902305531255890510516", "11799680974454823067211378153820545307", "27441851347895680306540149871943443748", "306621189897545271164266278940116169906", "224818983226224668315760798631631433297", "55599194368602570291527299964174240597", "38005699160580351063127852505190928808" ], "threshold": 0.9 }, "id": "CVE-2024-26771-3c425532", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9d508c897153ae8dd79303f7f035f078139f6b49" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/dma/ti/edma.c", "function": "edma_probe" }, "deprecated": false, "digest": { "length": 5714.0, "function_hash": "178143911333444748203489752754092413655" }, "id": "CVE-2024-26771-67f3f1cc", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4fe4e5adc7d29d214c59b59f61db73dec505ca3d" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/dma/ti/edma.c", "function": "edma_probe" }, "deprecated": false, "digest": { "length": 5714.0, "function_hash": "178143911333444748203489752754092413655" }, "id": "CVE-2024-26771-72de5a30", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c432094aa7c9970f2fa10d2305d550d3810657ce" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/dma/ti/edma.c", "function": "edma_probe" }, "deprecated": false, "digest": { "length": 5714.0, "function_hash": "178143911333444748203489752754092413655" }, "id": "CVE-2024-26771-a7c2696c", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9d508c897153ae8dd79303f7f035f078139f6b49" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/dma/ti/edma.c" }, "deprecated": false, "digest": { "line_hashes": [ "39976870994884971095853915385313232606", "158687164681712763902305531255890510516", "11799680974454823067211378153820545307", "27441851347895680306540149871943443748", "306621189897545271164266278940116169906", "224818983226224668315760798631631433297", "55599194368602570291527299964174240597", "38005699160580351063127852505190928808" ], "threshold": 0.9 }, "id": "CVE-2024-26771-b92dfce6", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f2a5e30d1e9a629de6179fa23923a318d5feb29e" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/dma/ti/edma.c", "function": "edma_probe" }, "deprecated": false, "digest": { "length": 5714.0, "function_hash": "178143911333444748203489752754092413655" }, "id": "CVE-2024-26771-cb58d587", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f2a5e30d1e9a629de6179fa23923a318d5feb29e" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/dma/ti/edma.c", "function": "edma_probe" }, "deprecated": false, "digest": { "length": 5714.0, "function_hash": "178143911333444748203489752754092413655" }, "id": "CVE-2024-26771-d483354b", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7b24760f3a3c7ae1a176d343136b6c25174b7b27" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/dma/ti/edma.c", "function": "edma_probe" }, "deprecated": false, "digest": { "length": 5714.0, "function_hash": "178143911333444748203489752754092413655" }, "id": "CVE-2024-26771-d841ef1e", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e2276203ac9ff10fc76917ec9813c660f627369" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/dma/ti/edma.c" }, "deprecated": false, "digest": { "line_hashes": [ "39976870994884971095853915385313232606", "158687164681712763902305531255890510516", "11799680974454823067211378153820545307", "27441851347895680306540149871943443748", "306621189897545271164266278940116169906", "224818983226224668315760798631631433297", "55599194368602570291527299964174240597", "38005699160580351063127852505190928808" ], "threshold": 0.9 }, "id": "CVE-2024-26771-e4187686", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e2276203ac9ff10fc76917ec9813c660f627369" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/dma/ti/edma.c" }, "deprecated": false, "digest": { "line_hashes": [ "39976870994884971095853915385313232606", "158687164681712763902305531255890510516", "11799680974454823067211378153820545307", "27441851347895680306540149871943443748", "306621189897545271164266278940116169906", "224818983226224668315760798631631433297", "55599194368602570291527299964174240597", "38005699160580351063127852505190928808" ], "threshold": 0.9 }, "id": "CVE-2024-26771-e8ca9c69", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4fe4e5adc7d29d214c59b59f61db73dec505ca3d" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/dma/ti/edma.c" }, "deprecated": false, "digest": { "line_hashes": [ "39976870994884971095853915385313232606", "158687164681712763902305531255890510516", "11799680974454823067211378153820545307", "27441851347895680306540149871943443748", "306621189897545271164266278940116169906", "224818983226224668315760798631631433297", "55599194368602570291527299964174240597", "38005699160580351063127852505190928808" ], "threshold": 0.9 }, "id": "CVE-2024-26771-f3ba536d", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c432094aa7c9970f2fa10d2305d550d3810657ce" } ] }