CVE-2024-47749

In the Linux kernel, the following vulnerability has been resolved: RDMA/cxgb4: Added NULL check for lookup_atid The lookup_atid() function can return NULL if the ATID is invalid or does not exist in the identifier table, which could lead to dereferencing a null pointer without a check in the `act_establish()` and `act_open_rpl()` functions. Add a NULL check to prevent null pointer dereferencing. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/4e1fe68d695af367506ea3c794c5969630f21697 -
  • () https://git.kernel.org/stable/c/b12e25d91c7f97958341538c7dc63ee49d01548f -

22 Oct 2024, 16:08

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 5.5

22 Oct 2024, 15:00

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/cxgb4: Se agregó una comprobación NULL para lookup_atid La función lookup_atid() puede devolver NULL si el ATID no es válido o no existe en la tabla de identificadores, lo que podría provocar la desreferenciación de un puntero nulo sin una comprobación en las funciones `act_establish()` y `act_open_rpl()`. Agregue una comprobación NULL para evitar la desreferenciación de punteros nulos. Encontrado por Linux Verification Center (linuxtesting.org) con SVACE.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References () https://git.kernel.org/stable/c/0d50ae281a1712b9b2ca72830a96b8f11882358d - () https://git.kernel.org/stable/c/0d50ae281a1712b9b2ca72830a96b8f11882358d - Patch
References () https://git.kernel.org/stable/c/39cb9f39913566ec5865581135f3e8123ad1aee1 - () https://git.kernel.org/stable/c/39cb9f39913566ec5865581135f3e8123ad1aee1 - Patch
References () https://git.kernel.org/stable/c/54aaa3ed40972511e423b604324b881425b9ff1e - () https://git.kernel.org/stable/c/54aaa3ed40972511e423b604324b881425b9ff1e - Patch
References () https://git.kernel.org/stable/c/b11318dc8a1ec565300bb1a9073095af817cc508 - () https://git.kernel.org/stable/c/b11318dc8a1ec565300bb1a9073095af817cc508 - Patch
References () https://git.kernel.org/stable/c/b9c94c8ba5a713817cffd74c4bacc05187469624 - () https://git.kernel.org/stable/c/b9c94c8ba5a713817cffd74c4bacc05187469624 - Patch
References () https://git.kernel.org/stable/c/dd598ac57dcae796cb58551074660c39b43fb155 - () https://git.kernel.org/stable/c/dd598ac57dcae796cb58551074660c39b43fb155 - Patch
References () https://git.kernel.org/stable/c/e766e6a92410ca269161de059fff0843b8ddd65f - () https://git.kernel.org/stable/c/e766e6a92410ca269161de059fff0843b8ddd65f - Patch
First Time Linux linux Kernel
Linux
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Oct 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 13:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-47749

Mitre link : CVE-2024-47749

CVE.ORG link : CVE-2024-47749


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference