CVE-2024-56782

In the Linux kernel, the following vulnerability has been resolved: ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration() acpi_dev_hid_match() does not check for adev == NULL, dereferencing it unconditional. Add a check for adev being NULL before calling acpi_dev_hid_match(). At the moment acpi_quirk_skip_serdev_enumeration() is never called with a controller_parent without an ACPI companion, but better safe than sorry.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

09 Jan 2025, 21:00

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ACPI: x86: Agregar comprobación de adev NULL a acpi_quirk_skip_serdev_enumeration() acpi_dev_hid_match() no comprueba si adev == NULL, lo desreferencia de forma incondicional. Agregue una comprobación para adev como NULL antes de llamar a acpi_dev_hid_match(). En este momento, acpi_quirk_skip_serdev_enumeration() nunca se llama con un controller_parent sin un compañero ACPI, pero más vale prevenir que curar.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/4a49194f587a62d972b602e3e1a2c3cfe6567966 - () https://git.kernel.org/stable/c/4a49194f587a62d972b602e3e1a2c3cfe6567966 - Patch
References () https://git.kernel.org/stable/c/e173bce05f7032a8b4964cfef82a4b7668f5f3af - () https://git.kernel.org/stable/c/e173bce05f7032a8b4964cfef82a4b7668f5f3af - Patch
CWE CWE-476
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

08 Jan 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-08 18:15

Updated : 2025-01-09 21:00


NVD link : CVE-2024-56782

Mitre link : CVE-2024-56782

CVE.ORG link : CVE-2024-56782


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference