U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-35902 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net/rds: fix possible cp null dereference cp might be null, calling cp->cp_conn would produce null dereference [Simon Horman adds:] Analysis: * cp is a parameter of __rds_rdma_map and is not reassigned. * The following call-sites pass a NULL cp argument to __rds_rdma_map() - rds_get_mr() - rds_get_mr_for_dest * Prior to the code above, the following assumes that cp may be NULL (which is indicative, but could itself be unnecessary) trans_private = rs->rs_transport->get_mr( sg, nents, rs, &mr->r_key, cp ? cp->cp_conn : NULL, args->vec.addr, args->vec.bytes, need_odp ? ODP_ZEROBASED : ODP_NOT_NEEDED); * The code modified by this patch is guarded by IS_ERR(trans_private), where trans_private is assigned as per the previous point in this analysis. The only implementation of get_mr that I could locate is rds_ib_get_mr() which can return an ERR_PTR if the conn (4th) argument is NULL. * ret is set to PTR_ERR(trans_private). rds_ib_get_mr can return ERR_PTR(-ENODEV) if the conn (4th) argument is NULL. Thus ret may be -ENODEV in which case the code in question will execute. Conclusion: * cp may be NULL at the point where this patch adds a check; this patch does seem to address a possible bug


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/62fc3357e079a07a22465b9b6ef71bb6ea75ee4b
https://git.kernel.org/stable/c/62fc3357e079a07a22465b9b6ef71bb6ea75ee4b
https://git.kernel.org/stable/c/6794090c742008c53b344b35b021d4a3093dc50a
https://git.kernel.org/stable/c/6794090c742008c53b344b35b021d4a3093dc50a
https://git.kernel.org/stable/c/92309bed3c5fbe2ccd4c45056efd42edbd06162d
https://git.kernel.org/stable/c/92309bed3c5fbe2ccd4c45056efd42edbd06162d
https://git.kernel.org/stable/c/bcd46782e2ec3825d10c1552fcb674d491cc09f9
https://git.kernel.org/stable/c/bcd46782e2ec3825d10c1552fcb674d491cc09f9
https://git.kernel.org/stable/c/cbaac2e5488ed54833897264a5ffb2a341a9f196
https://git.kernel.org/stable/c/cbaac2e5488ed54833897264a5ffb2a341a9f196
https://git.kernel.org/stable/c/cfb786b03b03c5ff38882bee38525eb9987e4d14
https://git.kernel.org/stable/c/cfb786b03b03c5ff38882bee38525eb9987e4d14
https://git.kernel.org/stable/c/d275de8ea7be3a453629fddae41d4156762e814c
https://git.kernel.org/stable/c/d275de8ea7be3a453629fddae41d4156762e814c
https://git.kernel.org/stable/c/d49fac38479bfdaec52b3ea274d290c47a294029
https://git.kernel.org/stable/c/d49fac38479bfdaec52b3ea274d290c47a294029
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Weakness Enumeration

CWE-ID CWE Name Source

Change History

6 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-35902
NVD Published Date:
05/19/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org