๐Ÿ” CVE Alert

CVE-2024-46822

UNKNOWN 0.0

arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry In a review discussion of the changes to support vCPU hotplug where a check was added on the GICC being enabled if was online, it was noted that there is need to map back to the cpu and use that to index into a cpumask. As such, a valid ID is needed. If an MPIDR check fails in acpi_map_gic_cpu_interface() it is possible for the entry in cpu_madt_gicc[cpu] == NULL. This function would then cause a NULL pointer dereference. Whilst a path to trigger this has not been established, harden this caller against the possibility.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 27, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
0be7320a635c2e434e8b67e0e9474a85ceb421c4 < f57769ff6fa7f97f1296965f20e8a2bb3ee9fd0f 0be7320a635c2e434e8b67e0e9474a85ceb421c4 < 4c3b21204abb4fa3ab310fbbb5cf7f0e85f3a1bc 0be7320a635c2e434e8b67e0e9474a85ceb421c4 < 945be49f4e832a9184c313fdf8917475438a795b 0be7320a635c2e434e8b67e0e9474a85ceb421c4 < 40cae0df42e5e7f7a1c0f32deed9c4027c1ba94e 0be7320a635c2e434e8b67e0e9474a85ceb421c4 < 62ca6d3a905b4c40cd942f3cc645a6718f8bc7e7 0be7320a635c2e434e8b67e0e9474a85ceb421c4 < bc7fbb37e3d2df59336eadbd6a56be632e3c7df7 0be7320a635c2e434e8b67e0e9474a85ceb421c4 < 2488444274c70038eb6b686cba5f1ce48ebb9cdd
Linux / Linux
3.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f57769ff6fa7f97f1296965f20e8a2bb3ee9fd0f git.kernel.org: https://git.kernel.org/stable/c/4c3b21204abb4fa3ab310fbbb5cf7f0e85f3a1bc git.kernel.org: https://git.kernel.org/stable/c/945be49f4e832a9184c313fdf8917475438a795b git.kernel.org: https://git.kernel.org/stable/c/40cae0df42e5e7f7a1c0f32deed9c4027c1ba94e git.kernel.org: https://git.kernel.org/stable/c/62ca6d3a905b4c40cd942f3cc645a6718f8bc7e7 git.kernel.org: https://git.kernel.org/stable/c/bc7fbb37e3d2df59336eadbd6a56be632e3c7df7 git.kernel.org: https://git.kernel.org/stable/c/2488444274c70038eb6b686cba5f1ce48ebb9cdd lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html