CVE-2024-46677

In the Linux kernel, the following vulnerability has been resolved: gtp: fix a potential NULL pointer dereference When sockfd_lookup() fails, gtp_encap_enable_socket() returns a NULL pointer, but its callers only check for error pointers thus miss the NULL pointer case. Fix it by returning an error pointer with the error code carried from sockfd_lookup(). (I found this bug during code inspection.)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*

History

13 Sep 2024, 16:51

Type Values Removed Values Added
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/28c67f0f84f889fe9f4cbda8354132b20dc9212d - () https://git.kernel.org/stable/c/28c67f0f84f889fe9f4cbda8354132b20dc9212d - Patch
References () https://git.kernel.org/stable/c/4643b91691e969b1b9ad54bf552d7a990cfa3b87 - () https://git.kernel.org/stable/c/4643b91691e969b1b9ad54bf552d7a990cfa3b87 - Patch
References () https://git.kernel.org/stable/c/612edd35f2a3910ab1f61c1f2338889d4ba99fa2 - () https://git.kernel.org/stable/c/612edd35f2a3910ab1f61c1f2338889d4ba99fa2 - Patch
References () https://git.kernel.org/stable/c/620fe9809752fae91b4190e897b81ed9976dfb39 - () https://git.kernel.org/stable/c/620fe9809752fae91b4190e897b81ed9976dfb39 - Patch
References () https://git.kernel.org/stable/c/8bbb9e4e0e66a39282e582d0440724055404b38c - () https://git.kernel.org/stable/c/8bbb9e4e0e66a39282e582d0440724055404b38c - Patch
References () https://git.kernel.org/stable/c/bdd99e5f0ad5fa727b16f2101fe880aa2bff2f8e - () https://git.kernel.org/stable/c/bdd99e5f0ad5fa727b16f2101fe880aa2bff2f8e - Patch
References () https://git.kernel.org/stable/c/defd8b3c37b0f9cb3e0f60f47d3d78d459d57fda - () https://git.kernel.org/stable/c/defd8b3c37b0f9cb3e0f60f47d3d78d459d57fda - Patch
References () https://git.kernel.org/stable/c/e8b9930b0eb045d19e883c65ff9676fc89320c70 - () https://git.kernel.org/stable/c/e8b9930b0eb045d19e883c65ff9676fc89320c70 - Patch
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

13 Sep 2024, 14:06

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gtp: se corrige una posible desreferencia de puntero NULL Cuando sockfd_lookup() falla, gtp_encap_enable_socket() devuelve un puntero NULL, pero sus invocadores solo comprueban los punteros de error, por lo que pasan por alto el caso del puntero NULL. Arréglelo devolviendo un puntero de error con el código de error que lleva sockfd_lookup(). (Encontré este error durante la inspección del código).

13 Sep 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-13 06:15

Updated : 2024-09-13 16:51


NVD link : CVE-2024-46677

Mitre link : CVE-2024-46677

CVE.ORG link : CVE-2024-46677


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference