We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56660

net/mlx5: DR, prevent potential error pointer dereference



Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: DR, prevent potential error pointer dereference The dr_domain_add_vport_cap() function generally returns NULL on error but sometimes we want it to return ERR_PTR(-EBUSY) so the caller can retry. The problem here is that "ret" can be either -EBUSY or -ENOMEM and if it's and -ENOMEM then the error pointer is propogated back and eventually dereferenced in dr_ste_v0_build_src_gvmi_qpn_tag().

Reserved 2024-12-27 | Published 2024-12-27 | Updated 2025-01-20 | Assigner Linux

Product status

Default status
unaffected

11a45def2e197532c46aa908dedd52bc1ee378a2 before 61f720e801443d4e2a3c0261eda4ad8431458dca
affected

11a45def2e197532c46aa908dedd52bc1ee378a2 before 325cf73a1b449fea3158ab99d03a7a717aad1618
affected

11a45def2e197532c46aa908dedd52bc1ee378a2 before a59c61a1869ceefc65ef02886f91e8cd0062211f
affected

11a45def2e197532c46aa908dedd52bc1ee378a2 before 11776cff0b563c8b8a4fa76cab620bfb633a8cb8
affected

Default status
affected

5.16
affected

Any version before 5.16
unaffected

6.1.121
unaffected

6.6.67
unaffected

6.12.6
unaffected

6.13
unaffected

References

git.kernel.org/...c/61f720e801443d4e2a3c0261eda4ad8431458dca

git.kernel.org/...c/325cf73a1b449fea3158ab99d03a7a717aad1618

git.kernel.org/...c/a59c61a1869ceefc65ef02886f91e8cd0062211f

git.kernel.org/...c/11776cff0b563c8b8a4fa76cab620bfb633a8cb8

cve.org (CVE-2024-56660)

nvd.nist.gov (CVE-2024-56660)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56660

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.