Executive Summary

Informations
Name CVE-2024-41098 First vendor Publication 2024-07-29
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ata: libata-core: Fix null pointer dereference on error

If the ata_port_alloc() call in ata_host_alloc() fails, ata_host_release() will get called.

However, the code in ata_host_release() tries to free ata_port struct members unconditionally, which can lead to the following:

BUG: unable to handle page fault for address: 0000000000003990 PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 10 PID: 594 Comm: (udev-worker) Not tainted 6.10.0-rc5 #44 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014 RIP: 0010:ata_host_release.cold+0x2f/0x6e [libata] Code: e4 4d 63 f4 44 89 e2 48 c7 c6 90 ad 32 c0 48 c7 c7 d0 70 33 c0 49 83 c6 0e 41 RSP: 0018:ffffc90000ebb968 EFLAGS: 00010246 RAX: 0000000000000041 RBX: ffff88810fb52e78 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff88813b3218c0 RDI: ffff88813b3218c0 RBP: ffff88810fb52e40 R08: 0000000000000000 R09: 6c65725f74736f68 R10: ffffc90000ebb738 R11: 73692033203a746e R12: 0000000000000004 R13: 0000000000000000 R14: 0000000000000011 R15: 0000000000000006 FS: 00007f6cc55b9980(0000) GS:ffff88813b300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000003990 CR3: 00000001122a2000 CR4: 0000000000750ef0 PKRU: 55555554 Call Trace:

? __die_body.cold+0x19/0x27
? page_fault_oops+0x15a/0x2f0
? exc_page_fault+0x7e/0x180
? asm_exc_page_fault+0x26/0x30
? ata_host_release.cold+0x2f/0x6e [libata]
? ata_host_release.cold+0x2f/0x6e [libata]
release_nodes+0x35/0xb0
devres_release_group+0x113/0x140
ata_host_alloc+0xed/0x120 [libata]
ata_host_alloc_pinfo+0x14/0xa0 [libata]
ahci_init_one+0x6c9/0xd20 [ahci]

Do not access ata_port struct members unconditionally.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3635

Sources (Detail)

https://git.kernel.org/stable/c/0f0d37c154bb108730c90a91aa31e3170e827962
https://git.kernel.org/stable/c/119c97ace2a9ffcf4dc09a23bb057d6c281aff28
https://git.kernel.org/stable/c/221e3b1297e74fdec32d0f572f4dcb2260a0a2af
https://git.kernel.org/stable/c/56e62977eaaae3eb7122ee2cf9b720b6703114a9
https://git.kernel.org/stable/c/5d92c7c566dc76d96e0e19e481d926bbe6631c1e
https://git.kernel.org/stable/c/8a8ff7e3b736a70d7b7c8764cbcd2724d4079ec8
https://git.kernel.org/stable/c/d9c4df80b1b009de1eb77c07e3bb4d45bd212aa5
https://git.kernel.org/stable/c/e83405e75d90694ee6a5d898f7f0473ac2686054
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Date Informations
2025-01-08 03:03:50
  • Multiple Updates
2025-01-07 03:03:23
  • Multiple Updates
2024-12-25 03:02:00
  • Multiple Updates
2024-12-12 03:04:58
  • Multiple Updates
2024-11-25 09:23:24
  • Multiple Updates
2024-11-22 21:22:38
  • Multiple Updates
2024-11-21 21:22:09
  • Multiple Updates
2024-11-20 02:58:35
  • Multiple Updates
2024-11-14 02:58:54
  • Multiple Updates
2024-11-09 02:58:55
  • Multiple Updates
2024-10-26 02:56:19
  • Multiple Updates
2024-10-25 02:58:13
  • Multiple Updates
2024-10-23 02:57:26
  • Multiple Updates
2024-10-03 02:52:46
  • Multiple Updates
2024-10-02 02:51:10
  • Multiple Updates
2024-09-15 02:48:55
  • Multiple Updates
2024-09-11 21:27:58
  • Multiple Updates
2024-09-06 21:28:18
  • Multiple Updates
2024-09-06 00:27:57
  • Multiple Updates
2024-09-04 17:27:37
  • Multiple Updates
2024-09-04 02:49:50
  • Multiple Updates
2024-08-22 02:47:44
  • Multiple Updates
2024-08-08 21:27:52
  • Multiple Updates
2024-07-29 21:27:27
  • First insertion