CVE-2024-53120
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
02/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mlx5e: CT: Fix null-ptr-deref in add rule err flow<br />
<br />
In error flow of mlx5_tc_ct_entry_add_rule(), in case ct_rule_add()<br />
callback returns error, zone_rule->attr is used uninitiated. Fix it to<br />
use attr which has the needed pointer value.<br />
<br />
Kernel log:<br />
BUG: kernel NULL pointer dereference, address: 0000000000000110<br />
RIP: 0010:mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core]<br />
…<br />
Call Trace:<br />
<br />
? __die+0x20/0x70<br />
? page_fault_oops+0x150/0x3e0<br />
? exc_page_fault+0x74/0x140<br />
? asm_exc_page_fault+0x22/0x30<br />
? mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core]<br />
? mlx5_tc_ct_entry_add_rule+0x1d5/0x2f0 [mlx5_core]<br />
mlx5_tc_ct_block_flow_offload+0xc6a/0xf90 [mlx5_core]<br />
? nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table]<br />
nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table]<br />
flow_offload_work_handler+0x142/0x320 [nf_flow_table]<br />
? finish_task_switch.isra.0+0x15b/0x2b0<br />
process_one_work+0x16c/0x320<br />
worker_thread+0x28c/0x3a0<br />
? __pfx_worker_thread+0x10/0x10<br />
kthread+0xb8/0xf0<br />
? __pfx_kthread+0x10/0x10<br />
ret_from_fork+0x2d/0x50<br />
? __pfx_kthread+0x10/0x10<br />
ret_from_fork_asm+0x1a/0x30<br />
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 6.1.119 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.63 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/06dc488a593020bd2f006798557d2a32104d8359
- https://git.kernel.org/stable/c/0c7c70ff8b696cfedba350411dca736361ef9a0f
- https://git.kernel.org/stable/c/6030f8bd7902e9e276a0edc09bf11979e4e2bc2e
- https://git.kernel.org/stable/c/882f392d9e3649557e71efd78ae20c86039ffb7c
- https://git.kernel.org/stable/c/e99c6873229fe0482e7ceb7d5600e32d623ed9d9
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



