In the Linux kernel, the following vulnerability has been resolved:
spi: intel: Add check devm_kasprintf() returned value
intelspipopulatechip() use devmkasprintf() to set pdata->name. This can return a NULL pointer on failure but this returned value is not checked.
[
{
"id": "CVE-2024-46769-d7908ab8",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2920294686ec23211637998f3ec386dfd3d784a6",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "drivers/spi/spi-intel.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"264966055569422601690449278968732559636",
"212550323086820728735578642446752610841",
"296602639844971192455737257149425099329",
"218952922322154840030794876981390132118"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2024-46769-f329f789",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2920294686ec23211637998f3ec386dfd3d784a6",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "intel_spi_populate_chip",
"file": "drivers/spi/spi-intel.c"
},
"digest": {
"function_hash": "42572419266037101308489718265023261423",
"length": 1208.0
},
"signature_type": "Function"
}
]