In the Linux kernel, the following vulnerability has been resolved:
pinctrl: apple: check devm_kasprintf() returned value
devm_kasprintf() can return a NULL pointer on failure but this returned value is not checked. Fix this lack and check the returned value.
Found by code review.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@665a58fe663ac7a9ea618dc0b29881649324b116",
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2024-50069-2c78a468",
"target": {
"function": "apple_gpio_pinctrl_probe",
"file": "drivers/pinctrl/pinctrl-apple-gpio.c"
},
"digest": {
"length": 2484.0,
"function_hash": "120593444300437430158874722097973205095"
},
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fad940e2dd789155f99ecafa71a7baf6f96530bc",
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2024-50069-5910d73b",
"target": {
"function": "apple_gpio_pinctrl_probe",
"file": "drivers/pinctrl/pinctrl-apple-gpio.c"
},
"digest": {
"length": 2484.0,
"function_hash": "120593444300437430158874722097973205095"
},
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@665a58fe663ac7a9ea618dc0b29881649324b116",
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2024-50069-65310894",
"target": {
"file": "drivers/pinctrl/pinctrl-apple-gpio.c"
},
"digest": {
"line_hashes": [
"70435786585132657685358135578048335742",
"231261535726454971619190509385055672664",
"338109243271465519821939060615913991991",
"231898976208359721427822498292211170668"
],
"threshold": 0.9
},
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a4d4dbef622ac8796a6665e0080da2685f9220a",
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2024-50069-8939c663",
"target": {
"file": "drivers/pinctrl/pinctrl-apple-gpio.c"
},
"digest": {
"line_hashes": [
"70435786585132657685358135578048335742",
"231261535726454971619190509385055672664",
"338109243271465519821939060615913991991",
"231898976208359721427822498292211170668"
],
"threshold": 0.9
},
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4d2296fb7c80fdc9925d29a8e85d617cad08731a",
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2024-50069-9b691a8c",
"target": {
"function": "apple_gpio_pinctrl_probe",
"file": "drivers/pinctrl/pinctrl-apple-gpio.c"
},
"digest": {
"length": 2484.0,
"function_hash": "120593444300437430158874722097973205095"
},
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fad940e2dd789155f99ecafa71a7baf6f96530bc",
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2024-50069-e9edf818",
"target": {
"file": "drivers/pinctrl/pinctrl-apple-gpio.c"
},
"digest": {
"line_hashes": [
"70435786585132657685358135578048335742",
"231261535726454971619190509385055672664",
"338109243271465519821939060615913991991",
"231898976208359721427822498292211170668"
],
"threshold": 0.9
},
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4d2296fb7c80fdc9925d29a8e85d617cad08731a",
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2024-50069-ed13dfd0",
"target": {
"file": "drivers/pinctrl/pinctrl-apple-gpio.c"
},
"digest": {
"line_hashes": [
"70435786585132657685358135578048335742",
"231261535726454971619190509385055672664",
"338109243271465519821939060615913991991",
"231898976208359721427822498292211170668"
],
"threshold": 0.9
},
"deprecated": false
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a4d4dbef622ac8796a6665e0080da2685f9220a",
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2024-50069-f92f3444",
"target": {
"function": "apple_gpio_pinctrl_probe",
"file": "drivers/pinctrl/pinctrl-apple-gpio.c"
},
"digest": {
"length": 2484.0,
"function_hash": "120593444300437430158874722097973205095"
},
"deprecated": false
}
]