CVE-2024-39506

Source
https://cve.org/CVERecord?id=CVE-2024-39506
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-39506.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-39506
Downstream
Related
Published
2024-07-12T12:20:38.298Z
Modified
2026-03-13T07:55:59.064355Z
Summary
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
Details

In the Linux kernel, the following vulnerability has been resolved:

liquidio: Adjust a NULL pointer handling path in liovfrepcopypacket

In liovfrepcopypacket() pginfo->page is compared to a NULL value, but then it is unconditionally passed to skbaddrxfrag() which looks strange and could lead to null pointer dereference.

liovfrepcopypacket() call trace looks like: octeondroqprocesspackets octeondroqfastprocesspackets octeondroqdispatchpkt octeoncreaterecvinfo ...search in the dispatchlist... ->dispfn(rdisp->rinfo, ...) liovfreppktrecv(struct octeonrecvinfo *recvinfo, ...) In this path there is no code which sets pginfo->page to NULL. So this check looks unneeded and doesn't solve potential problem. But I guess the author had reason to add a check and I have no such card and can't do real test. In addition, the code in the function liquidiopushpacket() in liquidio/liocore.c does exactly the same.

Based on this, I consider the most acceptable compromise solution to adjust this issue by moving skbaddrx_frag() into conditional scope.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/39xxx/CVE-2024-39506.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1f233f327913f3dee0602cba9c64df1903772b55
Fixed
87d6bdc006f0cbf297a3b2ad6e40ede4c3ee5dc2
Fixed
dcc7440f32c7a26b067aff6e7d931ec593024a79
Fixed
cbf18d8128a753cb632bef39470d19befd9c7347
Fixed
a86490a3712cc513113440a606a0e77130abd47c
Fixed
f1ab15a09492a5ae8ab1e2c35ba2cf9e150d25ee
Fixed
fd2b613bc4c508e55c1221c6595bb889812a4fea
Fixed
a6f4d0ec170a46b5f453cacf55dff5989b42bbfa
Fixed
c44711b78608c98a3e6b49ce91678cd0917d5349

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-39506.json"