In the Linux kernel, the following vulnerability has been resolved:
dmaengine: idxd: Fix potential null dereference on pointer status
There are calls to idxd_cmd_exec that pass a null status pointer however
a recent commit has added an assignment to *status that can end up
with a null pointer dereference. The function expects a null status
pointer sometimes as there is a later assignment to *status where
status is first null checked. Fix the issue by null checking status
before making the assignment.
Addresses-Coverity: ("Explicit null dereferenced")
References
Configurations
Configuration 1 (hide)
|
History
09 Dec 2024, 18:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-476 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97 - Patch | |
References | () https://git.kernel.org/stable/c/28ac8e03c43dfc6a703aa420d18222540b801120 - Patch | |
References | () https://git.kernel.org/stable/c/5756f757c72501ef1a16f5f63f940623044180e9 - Patch | |
References | () https://git.kernel.org/stable/c/7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa - Patch |
21 Nov 2024, 06:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97 - | |
References | () https://git.kernel.org/stable/c/28ac8e03c43dfc6a703aa420d18222540b801120 - | |
References | () https://git.kernel.org/stable/c/5756f757c72501ef1a16f5f63f940623044180e9 - | |
References | () https://git.kernel.org/stable/c/7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa - |
28 Feb 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-28 09:15
Updated : 2024-12-09 18:25
NVD link : CVE-2021-47003
Mitre link : CVE-2021-47003
CVE.ORG link : CVE-2021-47003
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference