Bugzilla – Bug 1223201
VUL-0: REJECTED: CVE-2024-26908: kernel: x86/xen: Add some null pointer checking to smp.c
Last modified: 2024-05-15 16:18:48 UTC
In the Linux kernel, the following vulnerability has been resolved: x86/xen: Add some null pointer checking to smp.c kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the pointer validity. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-26908 https://www.cve.org/CVERecord?id=CVE-2024-26908 https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc https://git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2 https://git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165 https://git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa https://git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4 https://git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af https://git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750 https://git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799 https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-26908.mbox https://bugzilla.redhat.com/show_bug.cgi?id=2275744
I don't see any security aspect for the issue the patch is fixing. It is nothing an unprivileged user could trigger, which is the reason why we in the Xen security team did _not_ issue an XSA for this fix. I think this CVE should be disputed.
REJECTED: https://lore.kernel.org/linux-cve-announce/2024043042-REJECTED-6155@gregkh/T/#u