In the Linux kernel, the following vulnerability has been resolved:
pmdomain: ti: Add a null pointer check to the omapprmdomain_init
devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the pointer validity.
{ "vanir_signatures": [ { "digest": { "line_hashes": [ "68296060659619511818405847417754940461", "209643310635626653370370237502738022979", "300925336954283348619654813902404192162", "6736804040436998801227173984149672594" ], "threshold": 0.9 }, "target": { "file": "drivers/pmdomain/ti/omap_prm.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d7f58ee08434a33340f75ac7ac5071eea9673b3", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-06d9a589" }, { "digest": { "length": 1063.0, "function_hash": "230659106361434126957965762130386942557" }, "target": { "function": "omap_prm_domain_init", "file": "drivers/pmdomain/ti/omap_prm.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d7f58ee08434a33340f75ac7ac5071eea9673b3", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-11390a5c" }, { "digest": { "line_hashes": [ "68296060659619511818405847417754940461", "209643310635626653370370237502738022979", "300925336954283348619654813902404192162", "6736804040436998801227173984149672594" ], "threshold": 0.9 }, "target": { "file": "drivers/pmdomain/ti/omap_prm.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ce666cecc09c0f92d5f86d89d8068ecfcf723a7e", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-7070f197" }, { "digest": { "length": 1063.0, "function_hash": "230659106361434126957965762130386942557" }, "target": { "function": "omap_prm_domain_init", "file": "drivers/pmdomain/ti/omap_prm.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ce666cecc09c0f92d5f86d89d8068ecfcf723a7e", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-72d4b2bf" }, { "digest": { "length": 1030.0, "function_hash": "335150477675608788650619592054365535547" }, "target": { "function": "omap_prm_domain_init", "file": "drivers/soc/ti/omap_prm.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e65f7eb117e1b44742212d65784236269085e736", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-a5c8aacc" }, { "digest": { "line_hashes": [ "68296060659619511818405847417754940461", "209643310635626653370370237502738022979", "300925336954283348619654813902404192162", "6736804040436998801227173984149672594" ], "threshold": 0.9 }, "target": { "file": "drivers/soc/ti/omap_prm.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc08f5ab11b1881b85371f0bd9c9a3d27f65cca8", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-a5ff69df" }, { "digest": { "length": 1063.0, "function_hash": "230659106361434126957965762130386942557" }, "target": { "function": "omap_prm_domain_init", "file": "drivers/pmdomain/ti/omap_prm.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04f23510daa40f9010fadf309507564a34ad956f", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-ae30184e" }, { "digest": { "length": 1070.0, "function_hash": "47252980217697969081159622516091422619" }, "target": { "function": "omap_prm_domain_init", "file": "drivers/soc/ti/omap_prm.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc08f5ab11b1881b85371f0bd9c9a3d27f65cca8", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-be0a8339" }, { "digest": { "line_hashes": [ "68296060659619511818405847417754940461", "209643310635626653370370237502738022979", "300925336954283348619654813902404192162", "6736804040436998801227173984149672594" ], "threshold": 0.9 }, "target": { "file": "drivers/pmdomain/ti/omap_prm.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04f23510daa40f9010fadf309507564a34ad956f", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-c8d12eb9" }, { "digest": { "line_hashes": [ "68296060659619511818405847417754940461", "209643310635626653370370237502738022979", "300925336954283348619654813902404192162", "6736804040436998801227173984149672594" ], "threshold": 0.9 }, "target": { "file": "drivers/soc/ti/omap_prm.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@984212fa6b4bc6d9ed58f5b0838e8d5af7679ce5", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-ce39aae2" }, { "digest": { "line_hashes": [ "68296060659619511818405847417754940461", "209643310635626653370370237502738022979", "300925336954283348619654813902404192162", "6736804040436998801227173984149672594" ], "threshold": 0.9 }, "target": { "file": "drivers/soc/ti/omap_prm.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e65f7eb117e1b44742212d65784236269085e736", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-e3a89496" }, { "digest": { "length": 1070.0, "function_hash": "47252980217697969081159622516091422619" }, "target": { "function": "omap_prm_domain_init", "file": "drivers/soc/ti/omap_prm.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@984212fa6b4bc6d9ed58f5b0838e8d5af7679ce5", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-35943-e9d5745f" } ] }