CVE-2024-38575

Source
https://cve.org/CVERecord?id=CVE-2024-38575
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38575.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-38575
Downstream
Related
Published
2024-06-19T13:37:34.476Z
Modified
2026-03-20T12:37:08.095829Z
Summary
wifi: brcmfmac: pcie: handle randbuf allocation failure
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: pcie: handle randbuf allocation failure

The kzalloc() in brcmfpciedownloadfwnvram() will return null if the physical memory has run out. As a result, if we use getrandombytes() to generate random bytes in the randbuf, the null pointer dereference bug will happen.

In order to prevent allocation failure, this patch adds a separate function using buffer on kernel stack to generate random bytes in the randbuf, which could prevent the kernel stack from overflow.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38575.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c35105f375b530bc27e03ea9250b1c26dd4cae86
Fixed
0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
91918ce88d9fef408bb12c46a27c73d79b604c20
Fixed
c37466406f075476c2702ecc01917928af871f3b
Fixed
7c15eb344b0d4d3468c9b2a7591ad2b859b29b88
Fixed
3729ca9e48d19a03ae049e2bde510e161c2f3720
Fixed
316f790ebcf94bdf59f794b7cdea4068dc676d4c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
ba72baed066f3bfa8b489e4b58f1fcaf51c04f83

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38575.json"