
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-46769 affects the Linux kernel's Intel SPI driver, specifically in the intel_spi_populate_chip() function. The vulnerability was discovered when it was found that the devm_kasprintf() function's return value was not being properly checked, which could lead to a NULL pointer being used. This issue was fixed in a commit by Charles Han on August 30, 2024 (Kernel Commit).
The vulnerability exists in the intel_spi_populate_chip() function where devm_kasprintf() is used to set pdata->name. The function can return a NULL pointer on failure, but this return value was not being checked in the code. This issue was introduced by an earlier commit (e58db3bcd93b) that added default partition and name to the second chip (Kernel Commit).
If exploited, this vulnerability could potentially lead to memory-related issues when the devm_kasprintf() function fails and returns NULL, which could affect the stability of systems using the Intel SPI driver (Kernel Commit).
The issue has been fixed by adding a NULL pointer check after the devm_kasprintf() call, which returns -ENOMEM if the allocation fails. Users should update to the patched version of the Linux kernel that includes this fix (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."