CVE-2024-39506

Source
https://cve.org/CVERecord?id=CVE-2024-39506
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-39506.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-39506
Downstream
Related
Published
2024-07-12T12:20:38.298Z
Modified
2026-05-18T05:57:15.346517211Z
Summary
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
Details

In the Linux kernel, the following vulnerability has been resolved:

liquidio: Adjust a NULL pointer handling path in liovfrepcopypacket

In liovfrepcopypacket() pginfo->page is compared to a NULL value, but then it is unconditionally passed to skbaddrxfrag() which looks strange and could lead to null pointer dereference.

liovfrepcopypacket() call trace looks like: octeondroqprocesspackets octeondroqfastprocesspackets octeondroqdispatchpkt octeoncreaterecvinfo ...search in the dispatchlist... ->dispfn(rdisp->rinfo, ...) liovfreppktrecv(struct octeonrecvinfo *recvinfo, ...) In this path there is no code which sets pginfo->page to NULL. So this check looks unneeded and doesn't solve potential problem. But I guess the author had reason to add a check and I have no such card and can't do real test. In addition, the code in the function liquidiopushpacket() in liquidio/liocore.c does exactly the same.

Based on this, I consider the most acceptable compromise solution to adjust this issue by moving skbaddrx_frag() into conditional scope.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/39xxx/CVE-2024-39506.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1f233f327913f3dee0602cba9c64df1903772b55
Fixed
87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2
Fixed
dcc7440f32c7a26b067aff6e7d931ec593024a79
Fixed
cbf18d8128a753cb632bef39470d19befd9c7347
Fixed
a86490a3712cc513113440a606a0e77130abd47c
Fixed
f1ab15a09492a5ae8ab1e2c35ba2cf9e150d25ee
Fixed
fd2b613bc4c508e55c1221c6595bb889812a4fea
Fixed
a6f4d0ec170a46b5f453cacf55dff5989b42bbfa
Fixed
c44711b78608c98a3e6b49ce91678cd0917d5349

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-39506.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.317
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.279
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.221
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.162
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.95
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.35
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.9.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-39506.json"