Executive Summary

Informations
Name CVE-2024-43875 First vendor Publication 2024-08-21
Vendor Cve Last vendor Modification 2024-08-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Clean up error handling in vpci_scan_bus()

Smatch complains about inconsistent NULL checking in vpci_scan_bus():

drivers/pci/endpoint/functions/pci-epf-vntb.c:1024 vpci_scan_bus() error: we previously assumed 'vpci_bus' could be null (see line 1021)

Instead of printing an error message and then crashing we should return an error code and clean up.

Also the NULL check is reversed so it prints an error for success instead of failure.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43875

Sources (Detail)

https://git.kernel.org/stable/c/0e27e2e8697b8ce96cdef43f135426525d9d1f8f
https://git.kernel.org/stable/c/24414c842a24d0fd498f9db6d2a762a8dddf1832
https://git.kernel.org/stable/c/7d368de78b60088ec9031c60c88976c0063ea4c0
https://git.kernel.org/stable/c/8e0f5a96c534f781e8c57ca30459448b3bfe5429
https://git.kernel.org/stable/c/b9e8695246bcfc028341470cbf92630cdc1ba36b
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2024-08-22 02:48:16
  • Multiple Updates
2024-08-22 02:48:01
  • Multiple Updates
2024-08-21 17:27:26
  • Multiple Updates
2024-08-21 09:27:29
  • First insertion