๐Ÿ” CVE Alert

CVE-2024-47749

UNKNOWN 0.0

RDMA/cxgb4: Added NULL check for lookup_atid

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: RDMA/cxgb4: Added NULL check for lookup_atid The lookup_atid() function can return NULL if the ATID is invalid or does not exist in the identifier table, which could lead to dereferencing a null pointer without a check in the `act_establish()` and `act_open_rpl()` functions. Add a NULL check to prevent null pointer dereferencing. Found by Linux Verification Center (linuxtesting.org) with SVACE.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
cfdda9d764362ab77b11a410bb928400e6520d57 < b12e25d91c7f97958341538c7dc63ee49d01548f cfdda9d764362ab77b11a410bb928400e6520d57 < 4e1fe68d695af367506ea3c794c5969630f21697 cfdda9d764362ab77b11a410bb928400e6520d57 < dd598ac57dcae796cb58551074660c39b43fb155 cfdda9d764362ab77b11a410bb928400e6520d57 < b11318dc8a1ec565300bb1a9073095af817cc508 cfdda9d764362ab77b11a410bb928400e6520d57 < 39cb9f39913566ec5865581135f3e8123ad1aee1 cfdda9d764362ab77b11a410bb928400e6520d57 < 0d50ae281a1712b9b2ca72830a96b8f11882358d cfdda9d764362ab77b11a410bb928400e6520d57 < 54aaa3ed40972511e423b604324b881425b9ff1e cfdda9d764362ab77b11a410bb928400e6520d57 < b9c94c8ba5a713817cffd74c4bacc05187469624 cfdda9d764362ab77b11a410bb928400e6520d57 < e766e6a92410ca269161de059fff0843b8ddd65f
Linux / Linux
2.6.35

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b12e25d91c7f97958341538c7dc63ee49d01548f git.kernel.org: https://git.kernel.org/stable/c/4e1fe68d695af367506ea3c794c5969630f21697 git.kernel.org: https://git.kernel.org/stable/c/dd598ac57dcae796cb58551074660c39b43fb155 git.kernel.org: https://git.kernel.org/stable/c/b11318dc8a1ec565300bb1a9073095af817cc508 git.kernel.org: https://git.kernel.org/stable/c/39cb9f39913566ec5865581135f3e8123ad1aee1 git.kernel.org: https://git.kernel.org/stable/c/0d50ae281a1712b9b2ca72830a96b8f11882358d git.kernel.org: https://git.kernel.org/stable/c/54aaa3ed40972511e423b604324b881425b9ff1e git.kernel.org: https://git.kernel.org/stable/c/b9c94c8ba5a713817cffd74c4bacc05187469624 git.kernel.org: https://git.kernel.org/stable/c/e766e6a92410ca269161de059fff0843b8ddd65f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html