Bug 1223201 (CVE-2024-26908)

Summary: VUL-0: REJECTED: CVE-2024-26908: kernel: x86/xen: Add some null pointer checking to smp.c
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED INVALID QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: camila.matos, carlos.lopez, mkoutny, osalvador, rfrohl
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/402403/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-26908:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Comment 2 Jürgen Groß 2024-04-29 11:17:09 UTC
I don't see any security aspect for the issue the patch is fixing.

It is nothing an unprivileged user could trigger, which is the reason why we in the Xen security team did _not_ issue an XSA for this fix.

I think this CVE should be disputed.