๐Ÿ” CVE Alert

CVE-2024-56660

MEDIUM 5.5

net/mlx5: DR, prevent potential error pointer dereference

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: DR, prevent potential error pointer dereference The dr_domain_add_vport_cap() function generally returns NULL on error but sometimes we want it to return ERR_PTR(-EBUSY) so the caller can retry. The problem here is that "ret" can be either -EBUSY or -ENOMEM and if it's and -ENOMEM then the error pointer is propogated back and eventually dereferenced in dr_ste_v0_build_src_gvmi_qpn_tag().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 27, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
11a45def2e197532c46aa908dedd52bc1ee378a2 < 61f720e801443d4e2a3c0261eda4ad8431458dca 11a45def2e197532c46aa908dedd52bc1ee378a2 < 325cf73a1b449fea3158ab99d03a7a717aad1618 11a45def2e197532c46aa908dedd52bc1ee378a2 < a59c61a1869ceefc65ef02886f91e8cd0062211f 11a45def2e197532c46aa908dedd52bc1ee378a2 < 11776cff0b563c8b8a4fa76cab620bfb633a8cb8
Linux / Linux
5.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/61f720e801443d4e2a3c0261eda4ad8431458dca git.kernel.org: https://git.kernel.org/stable/c/325cf73a1b449fea3158ab99d03a7a717aad1618 git.kernel.org: https://git.kernel.org/stable/c/a59c61a1869ceefc65ef02886f91e8cd0062211f git.kernel.org: https://git.kernel.org/stable/c/11776cff0b563c8b8a4fa76cab620bfb633a8cb8 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html