Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-35943
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-19 May, 2024 | 10:10
Updated At-05 Jan, 2026 | 10:35
Rejected At-
▼CVE Numbering Authority (CNA)
pmdomain: ti: Add a null pointer check to the omap_prm_domain_init

In the Linux kernel, the following vulnerability has been resolved: pmdomain: ti: Add a null pointer check to the omap_prm_domain_init devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the pointer validity.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/pmdomain/ti/omap_prm.c
Default Status
unaffected
Versions
Affected
  • From 58cbff023bfaeb9c290b5dbcc0a4bb327c653e18 before e65f7eb117e1b44742212d65784236269085e736 (git)
  • From 58cbff023bfaeb9c290b5dbcc0a4bb327c653e18 before 984212fa6b4bc6d9ed58f5b0838e8d5af7679ce5 (git)
  • From 58cbff023bfaeb9c290b5dbcc0a4bb327c653e18 before bc08f5ab11b1881b85371f0bd9c9a3d27f65cca8 (git)
  • From 58cbff023bfaeb9c290b5dbcc0a4bb327c653e18 before ce666cecc09c0f92d5f86d89d8068ecfcf723a7e (git)
  • From 58cbff023bfaeb9c290b5dbcc0a4bb327c653e18 before 04f23510daa40f9010fadf309507564a34ad956f (git)
  • From 58cbff023bfaeb9c290b5dbcc0a4bb327c653e18 before 5d7f58ee08434a33340f75ac7ac5071eea9673b3 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/pmdomain/ti/omap_prm.c
Default Status
affected
Versions
Affected
  • 5.10
Unaffected
  • From 0 before 5.10 (semver)
  • From 5.10.237 through 5.10.* (semver)
  • From 5.15.181 through 5.15.* (semver)
  • From 6.1.111 through 6.1.* (semver)
  • From 6.6.27 through 6.6.* (semver)
  • From 6.8.6 through 6.8.* (semver)
  • From 6.9 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/e65f7eb117e1b44742212d65784236269085e736
N/A
https://git.kernel.org/stable/c/984212fa6b4bc6d9ed58f5b0838e8d5af7679ce5
N/A
https://git.kernel.org/stable/c/bc08f5ab11b1881b85371f0bd9c9a3d27f65cca8
N/A
https://git.kernel.org/stable/c/ce666cecc09c0f92d5f86d89d8068ecfcf723a7e
N/A
https://git.kernel.org/stable/c/04f23510daa40f9010fadf309507564a34ad956f
N/A
https://git.kernel.org/stable/c/5d7f58ee08434a33340f75ac7ac5071eea9673b3
N/A
Hyperlink: https://git.kernel.org/stable/c/e65f7eb117e1b44742212d65784236269085e736
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/984212fa6b4bc6d9ed58f5b0838e8d5af7679ce5
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/bc08f5ab11b1881b85371f0bd9c9a3d27f65cca8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/ce666cecc09c0f92d5f86d89d8068ecfcf723a7e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/04f23510daa40f9010fadf309507564a34ad956f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5d7f58ee08434a33340f75ac7ac5071eea9673b3
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/ce666cecc09c0f92d5f86d89d8068ecfcf723a7e
x_transferred
https://git.kernel.org/stable/c/04f23510daa40f9010fadf309507564a34ad956f
x_transferred
https://git.kernel.org/stable/c/5d7f58ee08434a33340f75ac7ac5071eea9673b3
x_transferred
https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
N/A
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
N/A
Hyperlink: https://git.kernel.org/stable/c/ce666cecc09c0f92d5f86d89d8068ecfcf723a7e
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/04f23510daa40f9010fadf309507564a34ad956f
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/5d7f58ee08434a33340f75ac7ac5071eea9673b3
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Resource: N/A
Details not found