CVE-2024-46769

medium

Description

In the Linux kernel, the following vulnerability has been resolved: spi: intel: Add check devm_kasprintf() returned value intel_spi_populate_chip() use devm_kasprintf() to set pdata->name. This can return a NULL pointer on failure but this returned value is not checked.

References

https://git.kernel.org/stable/c/6e68abdc5d674f9f4185bf1e1956368d05df4838

https://git.kernel.org/stable/c/2920294686ec23211637998f3ec386dfd3d784a6

Details

Source: Mitre, NVD

Published: 2024-09-18

Updated: 2024-09-30

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00036