CVE-2024-50145
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
07/11/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
octeon_ep: Add SKB allocation failures handling in __octep_oq_process_rx()<br />
<br />
build_skb() returns NULL in case of a memory allocation failure so handle<br />
it inside __octep_oq_process_rx() to avoid NULL pointer dereference.<br />
<br />
__octep_oq_process_rx() is called during NAPI polling by the driver. If<br />
skb allocation fails, keep on pulling packets out of the Rx DMA queue: we<br />
shouldn&#39;t break the polling immediately and thus falsely indicate to the<br />
octep_napi_poll() that the Rx pressure is going down. As there is no<br />
associated skb in this case, don&#39;t process the packets and don&#39;t push them<br />
up the network stack - they are skipped.<br />
<br />
Helper function is implemented to unmmap/flush all the fragment buffers<br />
used by the dropped packet. &#39;alloc_failures&#39; counter is incremented to<br />
mark the skb allocation error in driver statistics.<br />
<br />
Found by Linux Verification Center (linuxtesting.org) with SVACE.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19 (including) | 6.1.115 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.59 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/09ce491112bbf0b866e2638d3e961c1c73d1f00b
- https://git.kernel.org/stable/c/2dedcb6f99f4c1a11944e7cc35dbeb9b18a5cbac
- https://git.kernel.org/stable/c/c2d2dc4f88bb3cfc4f3cc320fd3ff51b0ae5b0ea
- https://git.kernel.org/stable/c/eb592008f79be52ccef88cd9a5249b3fc0367278
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



