CVE-2024-43824

In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-test: Make use of cached 'epc_features' in pci_epf_test_core_init() Instead of getting the epc_features from pci_epc_get_features() API, use the cached pci_epf_test::epc_features value to avoid the NULL check. Since the NULL check is already performed in pci_epf_test_bind(), having one more check in pci_epf_test_core_init() is redundant and it is not possible to hit the NULL pointer dereference. Also with commit a01e7214bef9 ("PCI: endpoint: Remove "core_init_notifier" flag"), 'epc_features' got dereferenced without the NULL check, leading to the following false positive Smatch warning: drivers/pci/endpoint/functions/pci-epf-test.c:784 pci_epf_test_core_init() error: we previously assumed 'epc_features' could be null (see line 747) Thus, remove the redundant NULL check and also use the epc_features:: {msix_capable/msi_capable} flags directly to avoid local variables. [kwilczynski: commit log]
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Sep 2024, 17:48

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/5a5095a8bd1bd349cce1c879e5e44407a34dda8a - () https://git.kernel.org/stable/c/5a5095a8bd1bd349cce1c879e5e44407a34dda8a - Patch
References () https://git.kernel.org/stable/c/af4ad016abb1632ff7ee598a6037952b495e5b80 - () https://git.kernel.org/stable/c/af4ad016abb1632ff7ee598a6037952b495e5b80 - Patch
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

19 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: endpoint: pci-epf-test: utilice 'epc_features' en caché en pci_epf_test_core_init() En lugar de obtener epc_features de la API pci_epc_get_features(), utilice pci_epf_test en caché:: Valor epc_features para evitar la verificación NULL. Dado que la verificación NULL ya se realiza en pci_epf_test_bind(), tener una verificación más en pci_epf_test_core_init() es redundante y no es posible alcanzar la desreferencia del puntero NULL. Además, con el commit a01e7214bef9 ("PCI: endpoint: Remove "core_init_notifier" flag"), se eliminó la referencia a 'epc_features' sin la verificación NULL, lo que generó la siguiente advertencia de falso positivo Smatch: drivers/pci/endpoint/functions/pci-epf-test .c:784 Error de pci_epf_test_core_init(): anteriormente asumimos que 'epc_features' podría ser nulo (consulte la línea 747). Por lo tanto, elimine la verificación NULL redundante y también use los indicadores epc_features:: {msix_capable/msi_capable} directamente para evitar variables locales. [kwilczynski: registro de confirmación]

17 Aug 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-17 10:15

Updated : 2024-09-03 17:48


NVD link : CVE-2024-43824

Mitre link : CVE-2024-43824

CVE.ORG link : CVE-2024-43824


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference