CVE-2024-58020
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
27/02/2025
Last modified:
12/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
HID: multitouch: Add NULL check in mt_input_configured<br />
<br />
devm_kasprintf() can return a NULL pointer on failure,but this<br />
returned value in mt_input_configured() is not checked.<br />
Add NULL check in mt_input_configured(), to handle kernel NULL<br />
pointer dereference error.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.326 (including) | 4.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.295 (including) | 4.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.257 (including) | 5.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.195 (including) | 5.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.132 (including) | 5.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.53 (including) | 6.1.129 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.4.16 (including) | 6.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.5.3 (including) | 6.6.79 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2052b44cd0a62b6fdbe3371e5ba6029c56c400ca
- https://git.kernel.org/stable/c/4e7113f591163d99adc7cbcd7295030c8c5d3fc7
- https://git.kernel.org/stable/c/62f8bf06262b6fc55c58f4c5256140f1382f3b01
- https://git.kernel.org/stable/c/97c09cc2e72769edb6994b531edcfa313b96bade
- https://git.kernel.org/stable/c/9b8e2220d3a052a690b1d1b23019673e612494c5
- https://git.kernel.org/stable/c/a04d96ef67a42165f93194eef22a270acba4b74c
- https://git.kernel.org/stable/c/a6bfd3856e9f3da083f177753c623d58ba935e0a
- https://git.kernel.org/stable/c/aa879ef6d3acf96fa2c7122d0632061d4ea58d48
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://cert-portal.siemens.com/productcert/html/ssa-265688.html



