CVE-2024-43824

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
17/08/2024
Last modified:
03/09/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PCI: endpoint: pci-epf-test: Make use of cached &amp;#39;epc_features&amp;#39; in pci_epf_test_core_init()<br /> <br /> Instead of getting the epc_features from pci_epc_get_features() API, use<br /> the cached pci_epf_test::epc_features value to avoid the NULL check. Since<br /> the NULL check is already performed in pci_epf_test_bind(), having one more<br /> check in pci_epf_test_core_init() is redundant and it is not possible to<br /> hit the NULL pointer dereference.<br /> <br /> Also with commit a01e7214bef9 ("PCI: endpoint: Remove "core_init_notifier"<br /> flag"), &amp;#39;epc_features&amp;#39; got dereferenced without the NULL check, leading to<br /> the following false positive Smatch warning:<br /> <br /> drivers/pci/endpoint/functions/pci-epf-test.c:784 pci_epf_test_core_init() error: we previously assumed &amp;#39;epc_features&amp;#39; could be null (see line 747)<br /> <br /> Thus, remove the redundant NULL check and also use the epc_features::<br /> {msix_capable/msi_capable} flags directly to avoid local variables.<br /> <br /> [kwilczynski: commit log]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.7 (including) 6.10.3 (excluding)