{"id":"CVE-2024-45028","summary":"mmc: mmc_test: Fix NULL dereference on allocation failure","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: mmc_test: Fix NULL dereference on allocation failure\n\nIf the \"test-\u003ehighmem = alloc_pages()\" allocation fails then calling\n__free_pages(test-\u003ehighmem) will result in a NULL dereference.  Also\nchange the error code to -ENOMEM instead of returning success.","modified":"2026-04-02T12:18:39.972863Z","published":"2024-09-11T15:13:59.649Z","related":["SUSE-SU-2024:3551-1","SUSE-SU-2024:3553-1","SUSE-SU-2024:3561-1","SUSE-SU-2024:3564-1","SUSE-SU-2024:3569-1","SUSE-SU-2024:3587-1","SUSE-SU-2024:3592-1","SUSE-SU-2025:20073-1","SUSE-SU-2025:20077-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/45xxx/CVE-2024-45028.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2b507b03991f44dfb202fc2a82c9874d1b1f0c06"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3b4e76ceae5b5a46c968bd952f551ce173809f63"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9b9ba386d7bfdbc38445932c90fa9444c0524bea"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a1e627af32ed60713941cbfc8075d44cad07f6dd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cac2815f49d343b2f0acc4973d2c14918ac3ab0c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e40515582141a9e7c84b269be699c05236a499a6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e97be13a9f51284da450dd2a592e3fa87b49cdc9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ecb15b8ca12c0cbdab81e307e9795214d8b90890"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/45xxx/CVE-2024-45028.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45028"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2661081f5ab9cb25359d27f88707a018cf4e68e9"},{"fixed":"e97be13a9f51284da450dd2a592e3fa87b49cdc9"},{"fixed":"2b507b03991f44dfb202fc2a82c9874d1b1f0c06"},{"fixed":"9b9ba386d7bfdbc38445932c90fa9444c0524bea"},{"fixed":"e40515582141a9e7c84b269be699c05236a499a6"},{"fixed":"3b4e76ceae5b5a46c968bd952f551ce173809f63"},{"fixed":"cac2815f49d343b2f0acc4973d2c14918ac3ab0c"},{"fixed":"ecb15b8ca12c0cbdab81e307e9795214d8b90890"},{"fixed":"a1e627af32ed60713941cbfc8075d44cad07f6dd"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-45028.json"}}],"schema_version":"1.7.5"}