CVE-2024-36281
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/06/2024
Last modified:
09/09/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules<br />
<br />
rx_create no longer allocates a modify_hdr instance that needs to be<br />
cleaned up. The mlx5_modify_header_dealloc call will lead to a NULL pointer<br />
dereference. A leak in the rules also previously occurred since there are<br />
now two rules populated related to status.<br />
<br />
BUG: kernel NULL pointer dereference, address: 0000000000000000<br />
#PF: supervisor read access in kernel mode<br />
#PF: error_code(0x0000) - not-present page<br />
PGD 109907067 P4D 109907067 PUD 116890067 PMD 0<br />
Oops: 0000 [#1] SMP<br />
CPU: 1 PID: 484 Comm: ip Not tainted 6.9.0-rc2-rrameshbabu+ #254<br />
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS Arch Linux 1.16.3-1-1 04/01/2014<br />
RIP: 0010:mlx5_modify_header_dealloc+0xd/0x70<br />
<br />
Call Trace:<br />
<br />
? show_regs+0x60/0x70<br />
? __die+0x24/0x70<br />
? page_fault_oops+0x15f/0x430<br />
? free_to_partial_list.constprop.0+0x79/0x150<br />
? do_user_addr_fault+0x2c9/0x5c0<br />
? exc_page_fault+0x63/0x110<br />
? asm_exc_page_fault+0x27/0x30<br />
? mlx5_modify_header_dealloc+0xd/0x70<br />
rx_create+0x374/0x590<br />
rx_add_rule+0x3ad/0x500<br />
? rx_add_rule+0x3ad/0x500<br />
? mlx5_cmd_exec+0x2c/0x40<br />
? mlx5_create_ipsec_obj+0xd6/0x200<br />
mlx5e_accel_ipsec_fs_add_rule+0x31/0xf0<br />
mlx5e_xfrm_add_state+0x426/0xc00<br />
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.8 (including) | 6.6.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



