{
  "affected": [
    {
      "ranges": [
        {
          "events": [
            {
              "introduced": "51bd6f291583684f495ea498984dfc22049d7fd2"
            },
            {
              "fixed": "1a8a17c5ce9cb5a82797602bff9819ac732d2ff5"
            },
            {
              "fixed": "caac520350546e736894d14e051b64a9edb3600c"
            },
            {
              "fixed": "eb288ab33fd87579789cb331209ff09e988ff4f7"
            },
            {
              "fixed": "312a6445036d692bc5665307eeafa4508c33c4b5"
            },
            {
              "fixed": "4c9caf86d04dcb10e9fd8cd9db8eb79b5bfcc4d8"
            },
            {
              "fixed": "e529fbcf1f35f5fc3c839df7f06c3e3d02579715"
            },
            {
              "fixed": "a63284d415d4d114abd8be6e66a9558f3ca0702d"
            },
            {
              "fixed": "2378bd0b264ad3a1f76bd957caf33ee0c7945351"
            }
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "type": "GIT"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "Linux",
        "name": "Kernel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "5.3.0"
            },
            {
              "fixed": "5.4.291"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "5.5.0"
            },
            {
              "fixed": "5.10.235"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "5.11.0"
            },
            {
              "fixed": "5.15.179"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "5.16.0"
            },
            {
              "fixed": "6.1.129"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "6.2.0"
            },
            {
              "fixed": "6.6.76"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "6.7.0"
            },
            {
              "fixed": "6.12.13"
            }
          ],
          "type": "ECOSYSTEM"
        },
        {
          "events": [
            {
              "introduced": "6.13.0"
            },
            {
              "fixed": "6.13.2"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "database_specific": {
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/58xxx/CVE-2024-58051.json"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: ipmb: Add check devm_kasprintf() returned value\n\ndevm_kasprintf() can return a NULL pointer on failure but this\nreturned value is not checked.",
  "id": "CVE-2024-58051",
  "modified": "2025-12-04T02:35:40.862169685Z",
  "published": "2025-03-06T15:53:56.175Z",
  "references": [
    {
      "type": "PACKAGE",
      "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/1a8a17c5ce9cb5a82797602bff9819ac732d2ff5"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/2378bd0b264ad3a1f76bd957caf33ee0c7945351"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/312a6445036d692bc5665307eeafa4508c33c4b5"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/4c9caf86d04dcb10e9fd8cd9db8eb79b5bfcc4d8"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/a63284d415d4d114abd8be6e66a9558f3ca0702d"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/caac520350546e736894d14e051b64a9edb3600c"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/e529fbcf1f35f5fc3c839df7f06c3e3d02579715"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/eb288ab33fd87579789cb331209ff09e988ff4f7"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/58xxx/CVE-2024-58051.json"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-58051"
    }
  ],
  "schema_version": "1.7.3",
  "summary": "ipmi: ipmb: Add check devm_kasprintf() returned value"
}