In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix a possible null pointer dereference
In function lpfcxcvrdatashow, the memory allocation with kmalloc might fail, thereby making rdpcontext a null pointer. In the following context and functions that use this pointer, there are dereferencing operations, leading to null pointer dereference.
To fix this issue, a null pointer check should be added. If it is null, use scnprintf to notify the user and return len.
[
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e0bf3e8aec2cbc51123f84b29aaacbd91fc56fa",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"36970859384765345623867570123839047879",
"136473902747574616721569182295696950454",
"242773057811663407854193676955310266009",
"224405354381788500986282837980454677560"
]
},
"target": {
"file": "drivers/scsi/lpfc/lpfc_attr.c"
},
"id": "CVE-2024-43821-6d99e31b"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57600a7dd2b52c904f7c8d2cac0fd8c23868e680",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"36970859384765345623867570123839047879",
"136473902747574616721569182295696950454",
"242773057811663407854193676955310266009",
"224405354381788500986282837980454677560"
]
},
"target": {
"file": "drivers/scsi/lpfc/lpfc_attr.c"
},
"id": "CVE-2024-43821-76bbbd15"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57600a7dd2b52c904f7c8d2cac0fd8c23868e680",
"signature_type": "Function",
"digest": {
"function_hash": "73710803711532879181810466088457949342",
"length": 3804.0
},
"target": {
"function": "lpfc_xcvr_data_show",
"file": "drivers/scsi/lpfc/lpfc_attr.c"
},
"id": "CVE-2024-43821-90c1f71a"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e0bf3e8aec2cbc51123f84b29aaacbd91fc56fa",
"signature_type": "Function",
"digest": {
"function_hash": "73710803711532879181810466088457949342",
"length": 3804.0
},
"target": {
"function": "lpfc_xcvr_data_show",
"file": "drivers/scsi/lpfc/lpfc_attr.c"
},
"id": "CVE-2024-43821-97343df2"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@45b2a23e00d448a9e6d1f371ca3a4d4b073fe78c",
"signature_type": "Function",
"digest": {
"function_hash": "73710803711532879181810466088457949342",
"length": 3804.0
},
"target": {
"function": "lpfc_xcvr_data_show",
"file": "drivers/scsi/lpfc/lpfc_attr.c"
},
"id": "CVE-2024-43821-b8c66461"
},
{
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@45b2a23e00d448a9e6d1f371ca3a4d4b073fe78c",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"36970859384765345623867570123839047879",
"136473902747574616721569182295696950454",
"242773057811663407854193676955310266009",
"224405354381788500986282837980454677560"
]
},
"target": {
"file": "drivers/scsi/lpfc/lpfc_attr.c"
},
"id": "CVE-2024-43821-e671dbab"
}
]