In the Linux kernel, the following vulnerability has been resolved:
nbd: null check for nla_nest_start
nla_nest_start() may fail and return NULL. Insert a check and set errno
based on other call sites within the same source code.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
23 Dec 2024, 19:24
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-476 | |
References | () https://git.kernel.org/stable/c/31edf4bbe0ba27fd03ac7d87eb2ee3d2a231af6d - Patch | |
References | () https://git.kernel.org/stable/c/44214d744be32a4769faebba764510888f1eb19e - Patch | |
References | () https://git.kernel.org/stable/c/4af837db0fd3679fabc7b7758397090b0c06dced - Patch | |
References | () https://git.kernel.org/stable/c/96436365e5d80d0106ea785a4f80a58e7c9edff8 - Patch | |
References | () https://git.kernel.org/stable/c/98e60b538e66c90b9a856828c71d4e975ebfa797 - Patch | |
References | () https://git.kernel.org/stable/c/b7f5aed55829f376e4f7e5ea5b80ccdcb023e983 - Patch | |
References | () https://git.kernel.org/stable/c/ba6a9970ce9e284cbc04099361c58731e308596a - Patch | |
References | () https://git.kernel.org/stable/c/e803040b368d046434fbc8a91945c690332c4fcf - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
First Time |
Debian debian Linux
Debian Linux Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/31edf4bbe0ba27fd03ac7d87eb2ee3d2a231af6d - | |
References | () https://git.kernel.org/stable/c/44214d744be32a4769faebba764510888f1eb19e - | |
References | () https://git.kernel.org/stable/c/4af837db0fd3679fabc7b7758397090b0c06dced - | |
References | () https://git.kernel.org/stable/c/96436365e5d80d0106ea785a4f80a58e7c9edff8 - | |
References | () https://git.kernel.org/stable/c/98e60b538e66c90b9a856828c71d4e975ebfa797 - | |
References | () https://git.kernel.org/stable/c/b7f5aed55829f376e4f7e5ea5b80ccdcb023e983 - | |
References | () https://git.kernel.org/stable/c/ba6a9970ce9e284cbc04099361c58731e308596a - | |
References | () https://git.kernel.org/stable/c/e803040b368d046434fbc8a91945c690332c4fcf - |
05 Nov 2024, 10:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
01 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 13:15
Updated : 2024-12-23 19:24
NVD link : CVE-2024-27025
Mitre link : CVE-2024-27025
CVE.ORG link : CVE-2024-27025
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-476
NULL Pointer Dereference