CVE-2024-40940

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail In case of flow rule creation fail in mlx5_lag_create_port_sel_table(), instead of previously created rules, the tainted pointer is deleted deveral times. Fix this bug by using correct flow rules pointers. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*

History

17 Sep 2025, 15:01

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-415
References () https://git.kernel.org/stable/c/229bedbf62b13af5aba6525ad10b62ad38d9ccb5 - () https://git.kernel.org/stable/c/229bedbf62b13af5aba6525ad10b62ad38d9ccb5 - Patch
References () https://git.kernel.org/stable/c/531eab2da27dd42d68dfb841d82e987f4a6738b8 - () https://git.kernel.org/stable/c/531eab2da27dd42d68dfb841d82e987f4a6738b8 - Patch
References () https://git.kernel.org/stable/c/a03a3fa12769e25f4385bee587afe1445aee7f7a - () https://git.kernel.org/stable/c/a03a3fa12769e25f4385bee587afe1445aee7f7a - Patch
References () https://git.kernel.org/stable/c/d857df86837ac1c30592e8a068204d16feac9930 - () https://git.kernel.org/stable/c/d857df86837ac1c30592e8a068204d16feac9930 - Patch
First Time Linux linux Kernel
Linux

21 Nov 2024, 09:31

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/229bedbf62b13af5aba6525ad10b62ad38d9ccb5 - () https://git.kernel.org/stable/c/229bedbf62b13af5aba6525ad10b62ad38d9ccb5 -
References () https://git.kernel.org/stable/c/531eab2da27dd42d68dfb841d82e987f4a6738b8 - () https://git.kernel.org/stable/c/531eab2da27dd42d68dfb841d82e987f4a6738b8 -
References () https://git.kernel.org/stable/c/a03a3fa12769e25f4385bee587afe1445aee7f7a - () https://git.kernel.org/stable/c/a03a3fa12769e25f4385bee587afe1445aee7f7a -
References () https://git.kernel.org/stable/c/d857df86837ac1c30592e8a068204d16feac9930 - () https://git.kernel.org/stable/c/d857df86837ac1c30592e8a068204d16feac9930 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: Se corrige la eliminación del puntero contaminado en caso de error en la creación de reglas de flujo. En caso de que falle la creación de reglas de flujo en mlx5_lag_create_port_sel_table(), en lugar de las reglas creadas previamente, se elimina el puntero contaminado varias veces. Corrija este error utilizando punteros de reglas de flujo correctos. Encontrado por el Centro de verificación de Linux (linuxtesting.org) con SVACE.

12 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-09-17 15:01


NVD link : CVE-2024-40940

Mitre link : CVE-2024-40940

CVE.ORG link : CVE-2024-40940


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free