Release Date: | 2024-05-01 |
In the Linux kernel, the following vulnerability has been resolved:\nclk: Fix clk_core_get NULL dereference\nIt is possible for clk_core_get to dereference a NULL in the following\nsequence:\nclk_core_get()\nof_clk_get_hw_from_clkspec()\n__of_clk_get_hw_from_provider()\n__clk_get_hw()\n__clk_get_hw() can return NULL which is dereferenced by clk_core_get() at\nhw->core.\nPrior to commit dde4eff47c82 ('clk: Look for parents with clkdev based\nclk_lookups') the check IS_ERR_OR_NULL() was performed which would have\ncaught the NULL.\nReading the description of this function it talks about returning NULL but\nthat cannot be so at the moment.\nUpdate the function to check for hw before dereferencing it and return NULL\nif hw is NULL.
See more information about CVE-2024-27038 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.1 metrics and score provided are preliminary and subject to review.
Base Score: | 5.5 | CVSS Vector: | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Attack Vector: | Local network | Attack Complexity: | Low |
Privileges Required: | Low | User Interaction: | None |
Scope: | Unchanged | Confidentiality Impact: | None |
Integrity Impact: | None | Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 9 (kernel) | ELSA-2024-9315 | 2024-11-14 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: