CVE-2024-46822

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-46822
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-46822.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-46822
Downstream
Related
Published
2024-09-27T13:15:14Z
Modified
2025-08-09T19:01:28Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

arm64: acpi: Harden getcpuforacpiid() against missing CPU entry

In a review discussion of the changes to support vCPU hotplug where a check was added on the GICC being enabled if was online, it was noted that there is need to map back to the cpu and use that to index into a cpumask. As such, a valid ID is needed.

If an MPIDR check fails in acpimapgiccpuinterface() it is possible for the entry in cpumadtgicc[cpu] == NULL. This function would then cause a NULL pointer dereference. Whilst a path to trigger this has not been established, harden this caller against the possibility.

References

Affected packages