CVE-2024-27038

In the Linux kernel, the following vulnerability has been resolved: clk: Fix clk_core_get NULL dereference It is possible for clk_core_get to dereference a NULL in the following sequence: clk_core_get() of_clk_get_hw_from_clkspec() __of_clk_get_hw_from_provider() __clk_get_hw() __clk_get_hw() can return NULL which is dereferenced by clk_core_get() at hw->core. Prior to commit dde4eff47c82 ("clk: Look for parents with clkdev based clk_lookups") the check IS_ERR_OR_NULL() was performed which would have caught the NULL. Reading the description of this function it talks about returning NULL but that cannot be so at the moment. Update the function to check for hw before dereferencing it and return NULL if hw is NULL.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2024, 14:11

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0efb9ef6fb95384ba631d6819e66f10392aabfa2 - () https://git.kernel.org/stable/c/0efb9ef6fb95384ba631d6819e66f10392aabfa2 - Patch
References () https://git.kernel.org/stable/c/239174535dba11f7b83de0eaaa27909024f8c185 - () https://git.kernel.org/stable/c/239174535dba11f7b83de0eaaa27909024f8c185 - Patch
References () https://git.kernel.org/stable/c/6f073b24a9e2becd25ac4505a9780a87e621bb51 - () https://git.kernel.org/stable/c/6f073b24a9e2becd25ac4505a9780a87e621bb51 - Patch
References () https://git.kernel.org/stable/c/a5d9b1aa61b401867b9066d54086b3e4ee91f8ed - () https://git.kernel.org/stable/c/a5d9b1aa61b401867b9066d54086b3e4ee91f8ed - Patch
References () https://git.kernel.org/stable/c/a8b2b26fdd011ebe36d68a9a321ca45801685959 - () https://git.kernel.org/stable/c/a8b2b26fdd011ebe36d68a9a321ca45801685959 - Patch
References () https://git.kernel.org/stable/c/c554badcae9c45b737a22d23454170c6020b90e6 - () https://git.kernel.org/stable/c/c554badcae9c45b737a22d23454170c6020b90e6 - Patch
References () https://git.kernel.org/stable/c/d7ae7d1265686b55832a445b1db8cdd69738ac07 - () https://git.kernel.org/stable/c/d7ae7d1265686b55832a445b1db8cdd69738ac07 - Patch
References () https://git.kernel.org/stable/c/e97fe4901e0f59a0bfd524578fe3768f8ca42428 - () https://git.kernel.org/stable/c/e97fe4901e0f59a0bfd524578fe3768f8ca42428 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Debian debian Linux
Debian
Linux
Linux linux Kernel
CWE CWE-476

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/0efb9ef6fb95384ba631d6819e66f10392aabfa2 - () https://git.kernel.org/stable/c/0efb9ef6fb95384ba631d6819e66f10392aabfa2 -
References () https://git.kernel.org/stable/c/239174535dba11f7b83de0eaaa27909024f8c185 - () https://git.kernel.org/stable/c/239174535dba11f7b83de0eaaa27909024f8c185 -
References () https://git.kernel.org/stable/c/6f073b24a9e2becd25ac4505a9780a87e621bb51 - () https://git.kernel.org/stable/c/6f073b24a9e2becd25ac4505a9780a87e621bb51 -
References () https://git.kernel.org/stable/c/a5d9b1aa61b401867b9066d54086b3e4ee91f8ed - () https://git.kernel.org/stable/c/a5d9b1aa61b401867b9066d54086b3e4ee91f8ed -
References () https://git.kernel.org/stable/c/a8b2b26fdd011ebe36d68a9a321ca45801685959 - () https://git.kernel.org/stable/c/a8b2b26fdd011ebe36d68a9a321ca45801685959 -
References () https://git.kernel.org/stable/c/c554badcae9c45b737a22d23454170c6020b90e6 - () https://git.kernel.org/stable/c/c554badcae9c45b737a22d23454170c6020b90e6 -
References () https://git.kernel.org/stable/c/d7ae7d1265686b55832a445b1db8cdd69738ac07 - () https://git.kernel.org/stable/c/d7ae7d1265686b55832a445b1db8cdd69738ac07 -
References () https://git.kernel.org/stable/c/e97fe4901e0f59a0bfd524578fe3768f8ca42428 - () https://git.kernel.org/stable/c/e97fe4901e0f59a0bfd524578fe3768f8ca42428 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 21:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: corrige la desreferencia de clk_core_get NULL Es posible que clk_core_get elimine la referencia a un NULL en la siguiente secuencia: clk_core_get() of_clk_get_hw_from_clkspec() __of_clk_get_hw_from_provider() __clk_get_hw() __clk_get_hw() puede devolver NULL que es desreferenciado por clk_core_get() en hw->core. Antes de confirmar dde4eff47c82 ("clk: buscar padres con clk_lookups basado en clkdev") se realizó la verificación IS_ERR_OR_NULL() que habría detectado el NULL. Leyendo la descripción de esta función se habla de devolver NULL pero eso no puede ser así por el momento. Actualice la función para verificar hw antes de eliminar la referencia y devuelva NULL si hw es NULL.
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

01 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 13:15

Updated : 2024-12-23 14:11


NVD link : CVE-2024-27038

Mitre link : CVE-2024-27038

CVE.ORG link : CVE-2024-27038


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-476

NULL Pointer Dereference