CVE-2024-46822

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
27/09/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry<br /> <br /> In a review discussion of the changes to support vCPU hotplug where<br /> a check was added on the GICC being enabled if was online, it was<br /> noted that there is need to map back to the cpu and use that to index<br /> into a cpumask. As such, a valid ID is needed.<br /> <br /> If an MPIDR check fails in acpi_map_gic_cpu_interface() it is possible<br /> for the entry in cpu_madt_gicc[cpu] == NULL. This function would<br /> then cause a NULL pointer dereference. Whilst a path to trigger<br /> this has not been established, harden this caller against the<br /> possibility.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.284 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.226 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.167 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.110 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.51 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.10 (excluding)