CVE-2024-43875
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
PCI: endpoint: Clean up error handling in vpci_scan_bus()<br />
<br />
Smatch complains about inconsistent NULL checking in vpci_scan_bus():<br />
<br />
drivers/pci/endpoint/functions/pci-epf-vntb.c:1024 vpci_scan_bus() error: we previously assumed &#39;vpci_bus&#39; could be null (see line 1021)<br />
<br />
Instead of printing an error message and then crashing we should return<br />
an error code and clean up.<br />
<br />
Also the NULL check is reversed so it prints an error for success<br />
instead of failure.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.153 (including) | 5.15.165 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.1.103 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.44 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0e27e2e8697b8ce96cdef43f135426525d9d1f8f
- https://git.kernel.org/stable/c/24414c842a24d0fd498f9db6d2a762a8dddf1832
- https://git.kernel.org/stable/c/7d368de78b60088ec9031c60c88976c0063ea4c0
- https://git.kernel.org/stable/c/8e0f5a96c534f781e8c57ca30459448b3bfe5429
- https://git.kernel.org/stable/c/b9e8695246bcfc028341470cbf92630cdc1ba36b
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



