CVE-2024-36953 — NULL Pointer Dereference in Linux
Severity
5.5MEDIUMNVD
OSV7.8OSV6.5OSV4.7
EPSS
0.0%
top 97.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 30
Latest updateJan 14
Description
In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()
vgic_v2_parse_attr() is responsible for finding the vCPU that matches
the user-provided CPUID, which (of course) may not be valid. If the ID
is invalid, kvm_get_vcpu_by_id() returns NULL, which isn't handled
gracefully.
Similar to the GICv3 uaccess flow, check that kvm_get_vcpu_by_id()
actually returns something and fail the ioctl if not.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages5 packages
▶CVEListV5linux/linux7d450e2821710718fd6703e9c486249cee913bab — 4404465a1bee3607ad90a4c5f9e16dfd75b85728+6
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
23📋Vendor Advisories
23💬Community
1Bugzilla▶
CVE-2024-36953 kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()↗2024-06-03