Bug 2334571 (CVE-2024-56660) - CVE-2024-56660 kernel: net/mlx5: DR, prevent potential error pointer dereference
Summary: CVE-2024-56660 kernel: net/mlx5: DR, prevent potential error pointer dereference
Keywords:
Status: NEW
Alias: CVE-2024-56660
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-12-27 16:04 UTC by OSIDB Bzimport
Modified: 2024-12-28 01:25 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-12-27 16:04:18 UTC
In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: DR, prevent potential error pointer dereference

The dr_domain_add_vport_cap() function generally returns NULL on error
but sometimes we want it to return ERR_PTR(-EBUSY) so the caller can
retry.  The problem here is that "ret" can be either -EBUSY or -ENOMEM
and if it's and -ENOMEM then the error pointer is propogated back and
eventually dereferenced in dr_ste_v0_build_src_gvmi_qpn_tag().

Comment 1 Avinash Hanwate 2024-12-28 01:21:26 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2024122751-CVE-2024-56660-fb9d@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.