{"id":"CVE-2024-43860","summary":"remoteproc: imx_rproc: Skip over memory region when node value is NULL","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: imx_rproc: Skip over memory region when node value is NULL\n\nIn imx_rproc_addr_init() \"nph = of_count_phandle_with_args()\" just counts\nnumber of phandles. But phandles may be empty. So of_parse_phandle() in\nthe parsing loop (0 \u003c a \u003c nph) may return NULL which is later dereferenced.\nAdjust this issue by adding NULL-return check.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[Fixed title to fit within the prescribed 70-75 charcters]","modified":"2026-04-16T04:36:22.691278985Z","published":"2024-08-17T09:24:29.436Z","related":["SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3483-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43860.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2fa26ca8b786888673689ccc9da6094150939982"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4e13b7c23988c0a13fdca92e94296a3bc2ff9f21"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6884fd0283e0831be153fb8d82d9eda8a55acaaa"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6b50462b473fdccdc0dfad73001147e40ff19a66"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6c9ea3547fad252fe9ae5d3ed7e066e2085bf3a2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/84beb7738459cac0ff9f8a7c4654b8ff82a702c0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9a17cf8b2ce483fa75258bc2cdcf628f24bcf5f8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c877a5f5268d4ab8224b9c9fbce3d746e4e72bc9"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43860.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43860"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a0ff4aa6f010801b2a61c203c6e09d01b110fddf"},{"fixed":"6884fd0283e0831be153fb8d82d9eda8a55acaaa"},{"fixed":"84beb7738459cac0ff9f8a7c4654b8ff82a702c0"},{"fixed":"6b50462b473fdccdc0dfad73001147e40ff19a66"},{"fixed":"4e13b7c23988c0a13fdca92e94296a3bc2ff9f21"},{"fixed":"9a17cf8b2ce483fa75258bc2cdcf628f24bcf5f8"},{"fixed":"6c9ea3547fad252fe9ae5d3ed7e066e2085bf3a2"},{"fixed":"c877a5f5268d4ab8224b9c9fbce3d746e4e72bc9"},{"fixed":"2fa26ca8b786888673689ccc9da6094150939982"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-43860.json"}}],"schema_version":"1.7.5"}