NULL Pointer Dereference Affecting dlm-kmp-default package, versions <6.4.0-150600.23.22.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES156-DLMKMPDEFAULT-8080970
- published 24 Sep 2024
- disclosed 23 Sep 2024
Introduced: 23 Sep 2024
CVE-2024-43884 Open this link in a new tabHow to fix?
Upgrade SLES:15.6
dlm-kmp-default
to version 6.4.0-150600.23.22.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream dlm-kmp-default
package and not the dlm-kmp-default
package as distributed by SLES
.
See How to fix?
for SLES:15.6
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: MGMT: Add error handling to pair_device()
hci_conn_params_add() never checks for a NULL value and could lead to a NULL pointer dereference causing a crash.
Fixed by adding error handling in the function.
References
- https://www.suse.com/security/cve/CVE-2024-43884.html
- https://bugzilla.suse.com/1229739
- https://git.kernel.org/stable/c/538fd3921afac97158d4177139a0ad39f056dbb2
- https://git.kernel.org/stable/c/064dd929c76532359d2905d90a7c12348043cfd4
- https://git.kernel.org/stable/c/5da2884292329bc9be32a7778e0e119f06abe503
- https://git.kernel.org/stable/c/ee0799103b1ae4bcfd80dc11a15df085f6ee1b61
- https://git.kernel.org/stable/c/11b4b0e63f2621b33b2e107407a7d67a65994ca1
- https://git.kernel.org/stable/c/90e1ff1c15e5a8f3023ca8266e3a85869ed03ee9
- https://git.kernel.org/stable/c/951d6cb5eaac5130d076c728f2a6db420621afdb
- https://git.kernel.org/stable/c/9df9783bd85610d3d6e126a1aca221531f6f6dcb