๐Ÿ” CVE Alert

CVE-2024-58020

UNKNOWN 0.0

HID: multitouch: Add NULL check in mt_input_configured

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: Add NULL check in mt_input_configured devm_kasprintf() can return a NULL pointer on failure,but this returned value in mt_input_configured() is not checked. Add NULL check in mt_input_configured(), to handle kernel NULL pointer dereference error.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
df7ca43fe090e1a56c216c8ebc106ef5fd49afc6 < a04d96ef67a42165f93194eef22a270acba4b74c 15ec7cb55e7d88755aa01d44a7a1015a42bfce86 < a6bfd3856e9f3da083f177753c623d58ba935e0a dde88ab4e45beb60b217026207aa9c14c88d71ab < 2052b44cd0a62b6fdbe3371e5ba6029c56c400ca 2763732ec1e68910719c75b6b896e11b6d3d622b < 4e7113f591163d99adc7cbcd7295030c8c5d3fc7 4794394635293a3e74591351fff469cea7ad15a2 < 62f8bf06262b6fc55c58f4c5256140f1382f3b01 4794394635293a3e74591351fff469cea7ad15a2 < aa879ef6d3acf96fa2c7122d0632061d4ea58d48 4794394635293a3e74591351fff469cea7ad15a2 < 97c09cc2e72769edb6994b531edcfa313b96bade 4794394635293a3e74591351fff469cea7ad15a2 < 9b8e2220d3a052a690b1d1b23019673e612494c5 ac0d389402a6ff9ad92cea02c2d8c711483b91ab 39c70c19456e50dcb3abfe53539220dff0490f1d 1d7833db9fd118415dace2ca157bfa603dec9c8c b70ac7849248ec8128fa12f86e3655ba38838f29
Linux / Linux
6.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a04d96ef67a42165f93194eef22a270acba4b74c git.kernel.org: https://git.kernel.org/stable/c/a6bfd3856e9f3da083f177753c623d58ba935e0a git.kernel.org: https://git.kernel.org/stable/c/2052b44cd0a62b6fdbe3371e5ba6029c56c400ca git.kernel.org: https://git.kernel.org/stable/c/4e7113f591163d99adc7cbcd7295030c8c5d3fc7 git.kernel.org: https://git.kernel.org/stable/c/62f8bf06262b6fc55c58f4c5256140f1382f3b01 git.kernel.org: https://git.kernel.org/stable/c/aa879ef6d3acf96fa2c7122d0632061d4ea58d48 git.kernel.org: https://git.kernel.org/stable/c/97c09cc2e72769edb6994b531edcfa313b96bade git.kernel.org: https://git.kernel.org/stable/c/9b8e2220d3a052a690b1d1b23019673e612494c5 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html