CVE-2024-36476
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
15/01/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/rtrs: Ensure &#39;ib_sge list&#39; is accessible<br />
<br />
Move the declaration of the &#39;ib_sge list&#39; variable outside the<br />
&#39;always_invalidate&#39; block to ensure it remains accessible for use<br />
throughout the function.<br />
<br />
Previously, &#39;ib_sge list&#39; was declared within the &#39;always_invalidate&#39;<br />
block, limiting its accessibility, then caused a<br />
&#39;BUG: kernel NULL pointer dereference&#39;[1].<br />
? __die_body.cold+0x19/0x27<br />
? page_fault_oops+0x15a/0x2d0<br />
? search_module_extables+0x19/0x60<br />
? search_bpf_extables+0x5f/0x80<br />
? exc_page_fault+0x7e/0x180<br />
? asm_exc_page_fault+0x26/0x30<br />
? memcpy_orig+0xd5/0x140<br />
rxe_mr_copy+0x1c3/0x200 [rdma_rxe]<br />
? rxe_pool_get_index+0x4b/0x80 [rdma_rxe]<br />
copy_data+0xa5/0x230 [rdma_rxe]<br />
rxe_requester+0xd9b/0xf70 [rdma_rxe]<br />
? finish_task_switch.isra.0+0x99/0x2e0<br />
rxe_sender+0x13/0x40 [rdma_rxe]<br />
do_task+0x68/0x1e0 [rdma_rxe]<br />
process_one_work+0x177/0x330<br />
worker_thread+0x252/0x390<br />
? __pfx_worker_thread+0x10/0x10<br />
<br />
This change ensures the variable is available for subsequent operations<br />
that require it.<br />
<br />
[1] https://lore.kernel.org/linux-rdma/6a1f3e8f-deb0-49f9-bc69-a9b03ecfcda7@fujitsu.com/
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.8 (including) | 5.10.233 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.176 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.124 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.70 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/143378075904e78b3b2a810099bcc3b3d82d762f
- https://git.kernel.org/stable/c/32e1e748a85bd52b20b3857d80fd166d22fa455a
- https://git.kernel.org/stable/c/6ffb5c1885195ae5211a12b4acd2d51843ca41b0
- https://git.kernel.org/stable/c/7eaa71f56a6f7ab87957213472dc6d4055862722
- https://git.kernel.org/stable/c/b238f61cc394d5fef27b26d7d9aa383ebfddabb0
- https://git.kernel.org/stable/c/fb514b31395946022f13a08e06a435f53cf9e8b3
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



