In the Linux kernel, the following vulnerability has been resolved:
media: mtk-vcodec: potential null pointer deference in SCP
The return value of devm_kzalloc() needs to be checked to avoid NULL pointer deference. This is similar to CVE-2022-3113.
[
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/media/platform/mediatek/vcodec/mtk_vcodec_fw_scp.c"
},
"digest": {
"line_hashes": [
"77090877891204786583344212154591755716",
"77797239004795802233531042070996608150",
"277884687076570320732198454482700871100",
"42985426542548420502160606653412621727"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eeb62bb4ca22db17f7dfe8fb8472e0442df3d92f",
"signature_version": "v1",
"id": "CVE-2024-40973-2c2b8baa"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/media/platform/mediatek/vcodec/common/mtk_vcodec_fw_scp.c"
},
"digest": {
"line_hashes": [
"128081019881945696710360750751154806402",
"173642016792384744240537475992658078128",
"338251782995713045974972077773213585394",
"232879903177184722393704235107919089021"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3a693c7e243b932faee5c1fb728efa73f0abc39b",
"signature_version": "v1",
"id": "CVE-2024-40973-40eed89c"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/media/platform/mediatek/vcodec/common/mtk_vcodec_fw_scp.c",
"function": "mtk_vcodec_fw_scp_init"
},
"digest": {
"length": 649.0,
"function_hash": "225184934932341644211400589279065557435"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@53dbe08504442dc7ba4865c09b3bbf5fe849681b",
"signature_version": "v1",
"id": "CVE-2024-40973-427874b2"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/media/platform/mediatek/vcodec/mtk_vcodec_fw_scp.c",
"function": "mtk_vcodec_fw_scp_init"
},
"digest": {
"length": 378.0,
"function_hash": "159766269298131299416026825771881748190"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eeb62bb4ca22db17f7dfe8fb8472e0442df3d92f",
"signature_version": "v1",
"id": "CVE-2024-40973-4d3fa4eb"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "drivers/media/platform/mediatek/vcodec/common/mtk_vcodec_fw_scp.c"
},
"digest": {
"line_hashes": [
"128081019881945696710360750751154806402",
"173642016792384744240537475992658078128",
"338251782995713045974972077773213585394",
"232879903177184722393704235107919089021"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@53dbe08504442dc7ba4865c09b3bbf5fe849681b",
"signature_version": "v1",
"id": "CVE-2024-40973-4dbae972"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "drivers/media/platform/mediatek/vcodec/common/mtk_vcodec_fw_scp.c",
"function": "mtk_vcodec_fw_scp_init"
},
"digest": {
"length": 649.0,
"function_hash": "225184934932341644211400589279065557435"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3a693c7e243b932faee5c1fb728efa73f0abc39b",
"signature_version": "v1",
"id": "CVE-2024-40973-67297545"
}
]