U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-26908

Change History

CVE Modified by kernel.org 4/30/2024 4:15:17 AM

Action Type Old Value New Value
Removed CPE Configuration
OR
     
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 from (excluding) 6.7.11
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 from (excluding) 6.6.23
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 from (excluding) 6.1.83
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 from (excluding) 5.15.153
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 from (excluding) 5.10.214
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 from (excluding) 5.4.273
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (excluding) 4.19.311

								
						
Removed CVSS V3.1
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

								
						
Removed CWE
NIST CWE-476

								
						
Changed Description
In the Linux kernel, the following vulnerability has been resolved:

x86/xen: Add some null pointer checking to smp.c

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Removed Reference
kernel.org https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750

								
						
Removed Reference
kernel.org https://git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799

								
						

CVE Rejected by kernel.org 4/30/2024 4:15:17 AM

Action Type Old Value New Value

CVE Translated by kernel.org 4/30/2024 4:15:17 AM

Action Type Old Value New Value
Removed Translation
Title: kernel de Linux
Description: En el kernel de Linux, se resolvió la siguiente vulnerabilidad: x86/xen: agregue alguna verificación de puntero nulo a smp.c kasprintf() devuelve un puntero a la memoria asignada dinámicamente que puede ser NULL en caso de falla. Asegúrese de que la asignación se haya realizado correctamente comprobando la validez del puntero.