CVE-2024-26855

In the Linux kernel, the following vulnerability has been resolved: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() The function ice_bridge_setlink() may encounter a NULL pointer dereference if nlmsg_find_attr() returns NULL and br_spec is dereferenced subsequently in nla_for_each_nested(). To address this issue, add a check to ensure that br_spec is not NULL before proceeding with the nested attribute iteration.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

07 Jan 2025, 22:06

Type Values Removed Values Added
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/06e456a05d669ca30b224b8ed962421770c1496c - () https://git.kernel.org/stable/c/06e456a05d669ca30b224b8ed962421770c1496c - Patch
References () https://git.kernel.org/stable/c/0e296067ae0d74a10b4933601f9aa9f0ec8f157f - () https://git.kernel.org/stable/c/0e296067ae0d74a10b4933601f9aa9f0ec8f157f - Patch
References () https://git.kernel.org/stable/c/1a770927dc1d642b22417c3e668c871689fc58b3 - () https://git.kernel.org/stable/c/1a770927dc1d642b22417c3e668c871689fc58b3 - Patch
References () https://git.kernel.org/stable/c/37fe99016b12d32100ce670216816dba6c48b309 - () https://git.kernel.org/stable/c/37fe99016b12d32100ce670216816dba6c48b309 - Patch
References () https://git.kernel.org/stable/c/8d95465d9a424200485792858c5b3be54658ce19 - () https://git.kernel.org/stable/c/8d95465d9a424200485792858c5b3be54658ce19 - Patch
References () https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596 - () https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596 - Patch
References () https://git.kernel.org/stable/c/d9fefc51133107e59d192d773be86c1150cfeebb - () https://git.kernel.org/stable/c/d9fefc51133107e59d192d773be86c1150cfeebb - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Debian debian Linux
Debian
Linux
Linux linux Kernel

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/06e456a05d669ca30b224b8ed962421770c1496c - () https://git.kernel.org/stable/c/06e456a05d669ca30b224b8ed962421770c1496c -
References () https://git.kernel.org/stable/c/0e296067ae0d74a10b4933601f9aa9f0ec8f157f - () https://git.kernel.org/stable/c/0e296067ae0d74a10b4933601f9aa9f0ec8f157f -
References () https://git.kernel.org/stable/c/1a770927dc1d642b22417c3e668c871689fc58b3 - () https://git.kernel.org/stable/c/1a770927dc1d642b22417c3e668c871689fc58b3 -
References () https://git.kernel.org/stable/c/37fe99016b12d32100ce670216816dba6c48b309 - () https://git.kernel.org/stable/c/37fe99016b12d32100ce670216816dba6c48b309 -
References () https://git.kernel.org/stable/c/8d95465d9a424200485792858c5b3be54658ce19 - () https://git.kernel.org/stable/c/8d95465d9a424200485792858c5b3be54658ce19 -
References () https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596 - () https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596 -
References () https://git.kernel.org/stable/c/d9fefc51133107e59d192d773be86c1150cfeebb - () https://git.kernel.org/stable/c/d9fefc51133107e59d192d773be86c1150cfeebb -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ice: corrige una posible desreferencia de puntero NULL en ice_bridge_setlink() La función ice_bridge_setlink() puede encontrar una desreferencia de puntero NULL si nlmsg_find_attr() devuelve NULL y br_spec se desreferencia posteriormente en nla_for_each_nested( ). Para solucionar este problema, agregue una verificación para garantizar que br_spec no sea NULL antes de continuar con la iteración del atributo anidado.

17 Apr 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 11:15

Updated : 2025-01-07 22:06


NVD link : CVE-2024-26855

Mitre link : CVE-2024-26855

CVE.ORG link : CVE-2024-26855


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-476

NULL Pointer Dereference