In the Linux kernel, the following vulnerability has been resolved:
wifi: brcm80211: handle pmk_op allocation failure
The kzalloc() in brcmfpmksav3_op() will return null if the physical memory has run out. As a result, if we dereference the null value, the null pointer dereference bug will happen.
Return -ENOMEM from brcmfpmksav3op() if kzalloc() fails for pmkop.
[
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4152222e04cb8afeeca239c90e3fcaf4c553b42",
"id": "CVE-2024-27048-7462c4c8",
"digest": {
"function_hash": "120884980098900276530385347431009996306",
"length": 770.0
},
"target": {
"function": "brcmf_pmksa_v3_op",
"file": "drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c"
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6138a82f3bccfc67ed7ac059493579fc326c02e5",
"id": "CVE-2024-27048-7acc93b6",
"digest": {
"function_hash": "120884980098900276530385347431009996306",
"length": 770.0
},
"target": {
"function": "brcmf_pmksa_v3_op",
"file": "drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c"
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9975908315c13bae2f2ed5ba92870fa935180b0e",
"id": "CVE-2024-27048-7c4a6ffd",
"digest": {
"threshold": 0.9,
"line_hashes": [
"293944734575098697563413318144781010637",
"317249824330149778897167966933217319181",
"337407900651346625224246632083789121436",
"313436322670951527380316871721556687956"
]
},
"target": {
"file": "drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6138a82f3bccfc67ed7ac059493579fc326c02e5",
"id": "CVE-2024-27048-b8718212",
"digest": {
"threshold": 0.9,
"line_hashes": [
"293944734575098697563413318144781010637",
"317249824330149778897167966933217319181",
"337407900651346625224246632083789121436",
"313436322670951527380316871721556687956"
]
},
"target": {
"file": "drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b4152222e04cb8afeeca239c90e3fcaf4c553b42",
"id": "CVE-2024-27048-cee40a20",
"digest": {
"threshold": 0.9,
"line_hashes": [
"293944734575098697563413318144781010637",
"317249824330149778897167966933217319181",
"337407900651346625224246632083789121436",
"313436322670951527380316871721556687956"
]
},
"target": {
"file": "drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9975908315c13bae2f2ed5ba92870fa935180b0e",
"id": "CVE-2024-27048-fc2dcdf6",
"digest": {
"function_hash": "120884980098900276530385347431009996306",
"length": 770.0
},
"target": {
"function": "brcmf_pmksa_v3_op",
"file": "drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c"
},
"signature_type": "Function",
"signature_version": "v1"
}
]