
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-56660 is a vulnerability in the Linux kernel's net/mlx5 driver that involves a potential error pointer dereference. The issue was discovered in December 2024 and affects Linux kernel versions from 5.16 up to (excluding) 6.1.121, from 6.2 up to (excluding) 6.6.67, from 6.7 up to (excluding) 6.12.6, and release candidates 6.13-rc1 and 6.13-rc2 (NVD).
The vulnerability exists in the dr_domain_add_vport_cap() function of the MLX5 driver. The function normally returns NULL on error, but in some cases needs to return ERR_PTR(-EBUSY) to allow the caller to retry. The issue arises when the 'ret' variable can be either -EBUSY or -ENOMEM, and in the case of -ENOMEM, the error pointer is propagated back and eventually dereferenced in dr_ste_v0_build_src_gvmi_qpn_tag(). The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability can lead to a NULL pointer dereference in the Linux kernel's MLX5 driver, potentially resulting in a system crash or denial of service condition. The impact is limited to local attacks and requires local user privileges to exploit (NVD).
The vulnerability has been patched in the Linux kernel. The fix involves modifying the dr_domain_add_vport_cap() function to properly handle error conditions by returning NULL for -ENOMEM errors and ERR_PTR(-EBUSY) only for busy conditions. The patch has been applied to multiple kernel versions (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."