CVE-2024-58020
HID: multitouch: Add NULL check in mt_input_configured
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: Add NULL check in mt_input_configured devm_kasprintf() can return a NULL pointer on failure,but this returned value in mt_input_configured() is not checked. Add NULL check in mt_input_configured(), to handle kernel NULL pointer dereference error.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 27, 2025 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
df7ca43fe090e1a56c216c8ebc106ef5fd49afc6 < a04d96ef67a42165f93194eef22a270acba4b74c 15ec7cb55e7d88755aa01d44a7a1015a42bfce86 < a6bfd3856e9f3da083f177753c623d58ba935e0a dde88ab4e45beb60b217026207aa9c14c88d71ab < 2052b44cd0a62b6fdbe3371e5ba6029c56c400ca 2763732ec1e68910719c75b6b896e11b6d3d622b < 4e7113f591163d99adc7cbcd7295030c8c5d3fc7 4794394635293a3e74591351fff469cea7ad15a2 < 62f8bf06262b6fc55c58f4c5256140f1382f3b01 4794394635293a3e74591351fff469cea7ad15a2 < aa879ef6d3acf96fa2c7122d0632061d4ea58d48 4794394635293a3e74591351fff469cea7ad15a2 < 97c09cc2e72769edb6994b531edcfa313b96bade 4794394635293a3e74591351fff469cea7ad15a2 < 9b8e2220d3a052a690b1d1b23019673e612494c5 ac0d389402a6ff9ad92cea02c2d8c711483b91ab 39c70c19456e50dcb3abfe53539220dff0490f1d 1d7833db9fd118415dace2ca157bfa603dec9c8c b70ac7849248ec8128fa12f86e3655ba38838f29
Linux / Linux
6.6
References
git.kernel.org: https://git.kernel.org/stable/c/a04d96ef67a42165f93194eef22a270acba4b74c git.kernel.org: https://git.kernel.org/stable/c/a6bfd3856e9f3da083f177753c623d58ba935e0a git.kernel.org: https://git.kernel.org/stable/c/2052b44cd0a62b6fdbe3371e5ba6029c56c400ca git.kernel.org: https://git.kernel.org/stable/c/4e7113f591163d99adc7cbcd7295030c8c5d3fc7 git.kernel.org: https://git.kernel.org/stable/c/62f8bf06262b6fc55c58f4c5256140f1382f3b01 git.kernel.org: https://git.kernel.org/stable/c/aa879ef6d3acf96fa2c7122d0632061d4ea58d48 git.kernel.org: https://git.kernel.org/stable/c/97c09cc2e72769edb6994b531edcfa313b96bade git.kernel.org: https://git.kernel.org/stable/c/9b8e2220d3a052a690b1d1b23019673e612494c5 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html