In the Linux kernel, the following vulnerability has been resolved:
spi: intel: Add check devm_kasprintf() returned value
intelspipopulatechip() use devmkasprintf() to set pdata->name. This can return a NULL pointer on failure but this returned value is not checked.
[ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2920294686ec23211637998f3ec386dfd3d784a6", "target": { "file": "drivers/spi/spi-intel.c" }, "id": "CVE-2024-46769-d7908ab8", "deprecated": false, "signature_type": "Line", "signature_version": "v1", "digest": { "line_hashes": [ "264966055569422601690449278968732559636", "212550323086820728735578642446752610841", "296602639844971192455737257149425099329", "218952922322154840030794876981390132118" ], "threshold": 0.9 } }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2920294686ec23211637998f3ec386dfd3d784a6", "target": { "function": "intel_spi_populate_chip", "file": "drivers/spi/spi-intel.c" }, "id": "CVE-2024-46769-f329f789", "deprecated": false, "signature_type": "Function", "signature_version": "v1", "digest": { "function_hash": "42572419266037101308489718265023261423", "length": 1208.0 } } ]