In the Linux kernel, the following vulnerability has been resolved:
RDMA/cxgb4: Added NULL check for lookup_atid
The lookup_atid() function can return NULL if the ATID is
invalid or does not exist in the identifier table, which
could lead to dereferencing a null pointer without a
check in the `act_establish()` and `act_open_rpl()` functions.
Add a NULL check to prevent null pointer dereferencing.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
History
08 Nov 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Oct 2024, 16:08
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
22 Oct 2024, 15:00
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://git.kernel.org/stable/c/0d50ae281a1712b9b2ca72830a96b8f11882358d - Patch | |
References | () https://git.kernel.org/stable/c/39cb9f39913566ec5865581135f3e8123ad1aee1 - Patch | |
References | () https://git.kernel.org/stable/c/54aaa3ed40972511e423b604324b881425b9ff1e - Patch | |
References | () https://git.kernel.org/stable/c/b11318dc8a1ec565300bb1a9073095af817cc508 - Patch | |
References | () https://git.kernel.org/stable/c/b9c94c8ba5a713817cffd74c4bacc05187469624 - Patch | |
References | () https://git.kernel.org/stable/c/dd598ac57dcae796cb58551074660c39b43fb155 - Patch | |
References | () https://git.kernel.org/stable/c/e766e6a92410ca269161de059fff0843b8ddd65f - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-476 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
21 Oct 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-21 13:15
Updated : 2024-11-08 16:15
NVD link : CVE-2024-47749
Mitre link : CVE-2024-47749
CVE.ORG link : CVE-2024-47749
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference