CVE-2024-43824
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
17/08/2024
Last modified:
03/09/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
PCI: endpoint: pci-epf-test: Make use of cached &#39;epc_features&#39; in pci_epf_test_core_init()<br />
<br />
Instead of getting the epc_features from pci_epc_get_features() API, use<br />
the cached pci_epf_test::epc_features value to avoid the NULL check. Since<br />
the NULL check is already performed in pci_epf_test_bind(), having one more<br />
check in pci_epf_test_core_init() is redundant and it is not possible to<br />
hit the NULL pointer dereference.<br />
<br />
Also with commit a01e7214bef9 ("PCI: endpoint: Remove "core_init_notifier"<br />
flag"), &#39;epc_features&#39; got dereferenced without the NULL check, leading to<br />
the following false positive Smatch warning:<br />
<br />
drivers/pci/endpoint/functions/pci-epf-test.c:784 pci_epf_test_core_init() error: we previously assumed &#39;epc_features&#39; could be null (see line 747)<br />
<br />
Thus, remove the redundant NULL check and also use the epc_features::<br />
{msix_capable/msi_capable} flags directly to avoid local variables.<br />
<br />
[kwilczynski: commit log]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (including) | 6.10.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



