Unchecked Return Value Affecting kernel-tools package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELTOOLS-7602450
- published 5 Aug 2024
- disclosed 30 Jul 2024
How to fix?
There is no fixed version for RHEL:8
kernel-tools
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-tools
package and not the kernel-tools
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
In nouveau_connector_get_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a possible NULL pointer dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
References
- https://access.redhat.com/security/cve/CVE-2024-42101
- https://git.kernel.org/stable/c/1f32535238493008587a8c5cb17eb2ca097592ef
- https://git.kernel.org/stable/c/274cba8d2d1b48c72d8bd90e76c9e2dc1aa0a81d
- https://git.kernel.org/stable/c/744b229f09134ccd091427a6f9ea6d97302cfdd9
- https://git.kernel.org/stable/c/7db5411c5d0bd9c29b8c2ad93c36b5c16ea46c9e
- https://git.kernel.org/stable/c/80bec6825b19d95ccdfd3393cf8ec15ff2a749b4
- https://git.kernel.org/stable/c/9baf60323efa992b7c915094529f0a1882c34e7e
- https://git.kernel.org/stable/c/e36364f5f3785d054a94e57e971385284886d41a
- https://git.kernel.org/stable/c/f48dd3f19614022f2e1b794fbd169d2b4c398c07