CVE-2024-26908 - Linux Linux Kernel
Moderate 5.5
In the Linux kernel, the following vulnerability has been resolved: x86/xen: Add some null pointer checking to smp.c kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the pointer validity.
Affected software
Linux Linux Kernel
Reference links
- https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc
- https://git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2
- https://git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165
- https://git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa
- https://git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4
- https://git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af
- https://git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750
- https://git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799