First published: Fri Jul 12 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet In lio_vf_rep_copy_packet() pg_info->page is compared to a NULL value, but then it is unconditionally passed to skb_add_rx_frag() which looks strange and could lead to null pointer dereference. lio_vf_rep_copy_packet() call trace looks like: octeon_droq_process_packets octeon_droq_fast_process_packets octeon_droq_dispatch_pkt octeon_create_recv_info ...search in the dispatch_list... ->disp_fn(rdisp->rinfo, ...) lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...) In this path there is no code which sets pg_info->page to NULL. So this check looks unneeded and doesn't solve potential problem. But I guess the author had reason to add a check and I have no such card and can't do real test. In addition, the code in the function liquidio_push_packet() in liquidio/lio_core.c does exactly the same. Based on this, I consider the most acceptable compromise solution to adjust this issue by moving skb_add_rx_frag() into conditional scope. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.19.317 | 4.19.317 |
redhat/kernel | <5.4.279 | 5.4.279 |
redhat/kernel | <5.10.221 | 5.10.221 |
redhat/kernel | <5.15.162 | 5.15.162 |
redhat/kernel | <6.1.95 | 6.1.95 |
redhat/kernel | <6.6.35 | 6.6.35 |
redhat/kernel | <6.9.6 | 6.9.6 |
redhat/kernel | <6.10 | 6.10 |
Linux Kernel | >=4.15<4.19.317 | |
Linux Kernel | >=4.20<5.4.279 | |
Linux Kernel | >=5.5<5.10.221 | |
Linux Kernel | >=5.11<5.15.162 | |
Linux Kernel | >=5.16<6.1.95 | |
Linux Kernel | >=6.2<6.6.35 | |
Linux Kernel | >=6.7<6.9.6 | |
Linux Kernel | =6.10-rc1 | |
Linux Kernel | =6.10-rc2 | |
Linux Kernel | =6.10-rc3 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 | |
debian/linux-6.1 | 6.1.129-1~deb11u1 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39506 has a severity rating that indicates a potential for denial of service due to NULL pointer dereference.
To resolve CVE-2024-39506, upgrade the Linux kernel to the versions specified in the remedy, such as 4.19.317 or 6.10.
CVE-2024-39506 affects various versions of the Linux kernel across distributions like Red Hat and Debian.
The vulnerability in CVE-2024-39506 specifically involves the liquidio driver in the Linux kernel, affecting the packet handling mechanisms.
As of now, there is no public evidence indicating that CVE-2024-39506 is being actively exploited in the wild.