CVE-2024-42224

In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Correct check for empty list Since commit a3c53be55c95 ("net: dsa: mv88e6xxx: Support multiple MDIO busses") mv88e6xxx_default_mdio_bus() has checked that the return value of list_first_entry() is non-NULL. This appears to be intended to guard against the list chip->mdios being empty. However, it is not the correct check as the implementation of list_first_entry is not designed to return NULL for empty lists. Instead, use list_first_entry_or_null() which does return NULL if the list is empty. Flagged by Smatch. Compile tested only.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Sep 2024, 15:55

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 6.1

02 Aug 2024, 14:24

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2a2fe25a103cef73cde356e6d09da10f607e93f5 - () https://git.kernel.org/stable/c/2a2fe25a103cef73cde356e6d09da10f607e93f5 - Patch
References () https://git.kernel.org/stable/c/3bf8d70e1455f87856640c3433b3660a31001618 - () https://git.kernel.org/stable/c/3bf8d70e1455f87856640c3433b3660a31001618 - Patch
References () https://git.kernel.org/stable/c/3f25b5f1635449036692a44b771f39f772190c1d - () https://git.kernel.org/stable/c/3f25b5f1635449036692a44b771f39f772190c1d - Patch
References () https://git.kernel.org/stable/c/47d28dde172696031c880c5778633cdca30394ee - () https://git.kernel.org/stable/c/47d28dde172696031c880c5778633cdca30394ee - Patch
References () https://git.kernel.org/stable/c/4c7f3950a9fd53a62b156c0fe7c3a2c43b0ba19b - () https://git.kernel.org/stable/c/4c7f3950a9fd53a62b156c0fe7c3a2c43b0ba19b - Patch
References () https://git.kernel.org/stable/c/8c2c3cca816d074c75a2801d1ca0dea7b0148114 - () https://git.kernel.org/stable/c/8c2c3cca816d074c75a2801d1ca0dea7b0148114 - Patch
References () https://git.kernel.org/stable/c/aa03f591ef31ba603a4a99d05d25a0f21ab1cd89 - () https://git.kernel.org/stable/c/aa03f591ef31ba603a4a99d05d25a0f21ab1cd89 - Patch
References () https://git.kernel.org/stable/c/f75625db838ade28f032dacd0f0c8baca42ecde4 - () https://git.kernel.org/stable/c/f75625db838ade28f032dacd0f0c8baca42ecde4 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-754

30 Jul 2024, 13:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: mv88e6xxx: Verificación correcta de lista vacía Desde la confirmación a3c53be55c95 ("net: dsa: mv88e6xxx: Soporta múltiples buses MDIO") mv88e6xxx_default_mdio_bus() ha verificado que el valor de retorno de list_first_entry() no es NULL. Esto parece tener como objetivo proteger contra la lista chip->mdios que esté vacía. Sin embargo, no es la comprobación correcta ya que la implementación de list_first_entry no está diseñada para devolver NULL para listas vacías. En su lugar, utilice list_first_entry_or_null() que devuelve NULL si la lista está vacía. Marcado por Smatch. Compilación probada únicamente.

30 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-30 08:15

Updated : 2024-09-25 15:55


NVD link : CVE-2024-42224

Mitre link : CVE-2024-42224

CVE.ORG link : CVE-2024-42224


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions