NULL Pointer Dereference Affecting bpftool package, versions *
Threat Intelligence
EPSS
0.04% (6th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-BPFTOOL-7845464
- published 28 Aug 2024
- disclosed 26 Aug 2024
Introduced: 26 Aug 2024
CVE-2024-43884 Open this link in a new tabHow to fix?
There is no fixed version for Centos:8
bpftool
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bpftool
package and not the bpftool
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: MGMT: Add error handling to pair_device()
hci_conn_params_add() never checks for a NULL value and could lead to a NULL pointer dereference causing a crash.
Fixed by adding error handling in the function.
References
- https://access.redhat.com/security/cve/CVE-2024-43884
- https://git.kernel.org/stable/c/538fd3921afac97158d4177139a0ad39f056dbb2
- https://git.kernel.org/stable/c/064dd929c76532359d2905d90a7c12348043cfd4
- https://git.kernel.org/stable/c/5da2884292329bc9be32a7778e0e119f06abe503
- https://git.kernel.org/stable/c/ee0799103b1ae4bcfd80dc11a15df085f6ee1b61
- https://git.kernel.org/stable/c/11b4b0e63f2621b33b2e107407a7d67a65994ca1
- https://git.kernel.org/stable/c/90e1ff1c15e5a8f3023ca8266e3a85869ed03ee9
- https://git.kernel.org/stable/c/951d6cb5eaac5130d076c728f2a6db420621afdb
- https://git.kernel.org/stable/c/9df9783bd85610d3d6e126a1aca221531f6f6dcb
CVSS Scores
version 3.1