CVE-2024-46677

In the Linux kernel, the following vulnerability has been resolved: gtp: fix a potential NULL pointer dereference When sockfd_lookup() fails, gtp_encap_enable_socket() returns a NULL pointer, but its callers only check for error pointers thus miss the NULL pointer case. Fix it by returning an error pointer with the error code carried from sockfd_lookup(). (I found this bug during code inspection.)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Sep 2024, 16:51

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
References () https://git.kernel.org/stable/c/defd8b3c37b0f9cb3e0f60f47d3d78d459d57fda - () https://git.kernel.org/stable/c/defd8b3c37b0f9cb3e0f60f47d3d78d459d57fda - Patch
References () https://git.kernel.org/stable/c/620fe9809752fae91b4190e897b81ed9976dfb39 - () https://git.kernel.org/stable/c/620fe9809752fae91b4190e897b81ed9976dfb39 - Patch
References () https://git.kernel.org/stable/c/28c67f0f84f889fe9f4cbda8354132b20dc9212d - () https://git.kernel.org/stable/c/28c67f0f84f889fe9f4cbda8354132b20dc9212d - Patch
References () https://git.kernel.org/stable/c/4643b91691e969b1b9ad54bf552d7a990cfa3b87 - () https://git.kernel.org/stable/c/4643b91691e969b1b9ad54bf552d7a990cfa3b87 - Patch
References () https://git.kernel.org/stable/c/bdd99e5f0ad5fa727b16f2101fe880aa2bff2f8e - () https://git.kernel.org/stable/c/bdd99e5f0ad5fa727b16f2101fe880aa2bff2f8e - Patch
References () https://git.kernel.org/stable/c/8bbb9e4e0e66a39282e582d0440724055404b38c - () https://git.kernel.org/stable/c/8bbb9e4e0e66a39282e582d0440724055404b38c - Patch
References () https://git.kernel.org/stable/c/e8b9930b0eb045d19e883c65ff9676fc89320c70 - () https://git.kernel.org/stable/c/e8b9930b0eb045d19e883c65ff9676fc89320c70 - Patch
References () https://git.kernel.org/stable/c/612edd35f2a3910ab1f61c1f2338889d4ba99fa2 - () https://git.kernel.org/stable/c/612edd35f2a3910ab1f61c1f2338889d4ba99fa2 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel

13 Sep 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-13 06:15

Updated : 2024-09-13 16:51


NVD link : CVE-2024-46677

Mitre link : CVE-2024-46677


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference