CVE-2024-41084 (GCVE-0-2024-41084)

Vulnerability from cvelistv5 – Published: 2024-07-29 15:48 – Updated: 2026-05-11 20:25
VLAI?
Title
cxl/region: Avoid null pointer dereference in region lookup
Summary
In the Linux kernel, the following vulnerability has been resolved: cxl/region: Avoid null pointer dereference in region lookup cxl_dpa_to_region() looks up a region based on a memdev and DPA. It wrongly assumes an endpoint found mapping the DPA is also of a fully assembled region. When not true it leads to a null pointer dereference looking up the region name. This appears during testing of region lookup after a failure to assemble a BIOS defined region or if the lookup raced with the assembly of the BIOS defined region. Failure to clean up BIOS defined regions that fail assembly is an issue in itself and a fix to that problem will alleviate some of the impact. It will not alleviate the race condition so let's harden this path. The behavior change is that the kernel oops due to a null pointer dereference is replaced with a dev_dbg() message noting that an endpoint was mapped. Additional comments are added so that future users of this function can more clearly understand what it provides.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 0a105ab28a4de44eb738ce64e9ac74946aa5133b , < a9e099e29e925f8b31cfe53e8a786b9796f8e453 (git)
Affected: 0a105ab28a4de44eb738ce64e9ac74946aa5133b , < b8a40a6dbfb0150c1081384caa9bbe28ce5d5060 (git)
Affected: 0a105ab28a4de44eb738ce64e9ac74946aa5133b , < 285f2a08841432fc3e498b1cd00cce5216cdf189 (git)
Create a notification for this product.
Linux Linux Affected: 6.4
Unaffected: 0 , < 6.4 (semver)
Unaffected: 6.6.37 , ≤ 6.6.* (semver)
Unaffected: 6.9.8 , ≤ 6.9.* (semver)
Unaffected: 6.10 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T04:46:51.020Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a9e099e29e925f8b31cfe53e8a786b9796f8e453"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b8a40a6dbfb0150c1081384caa9bbe28ce5d5060"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/285f2a08841432fc3e498b1cd00cce5216cdf189"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41084",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:20:55.485513Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:59.089Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/cxl/core/region.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "a9e099e29e925f8b31cfe53e8a786b9796f8e453",
              "status": "affected",
              "version": "0a105ab28a4de44eb738ce64e9ac74946aa5133b",
              "versionType": "git"
            },
            {
              "lessThan": "b8a40a6dbfb0150c1081384caa9bbe28ce5d5060",
              "status": "affected",
              "version": "0a105ab28a4de44eb738ce64e9ac74946aa5133b",
              "versionType": "git"
            },
            {
              "lessThan": "285f2a08841432fc3e498b1cd00cce5216cdf189",
              "status": "affected",
              "version": "0a105ab28a4de44eb738ce64e9ac74946aa5133b",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/cxl/core/region.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.4"
            },
            {
              "lessThan": "6.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.37",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.9.*",
              "status": "unaffected",
              "version": "6.9.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.10",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.37",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.9.8",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/region: Avoid null pointer dereference in region lookup\n\ncxl_dpa_to_region() looks up a region based on a memdev and DPA.\nIt wrongly assumes an endpoint found mapping the DPA is also of\na fully assembled region. When not true it leads to a null pointer\ndereference looking up the region name.\n\nThis appears during testing of region lookup after a failure to\nassemble a BIOS defined region or if the lookup raced with the\nassembly of the BIOS defined region.\n\nFailure to clean up BIOS defined regions that fail assembly is an\nissue in itself and a fix to that problem will alleviate some of\nthe impact. It will not alleviate the race condition so let\u0027s harden\nthis path.\n\nThe behavior change is that the kernel oops due to a null pointer\ndereference is replaced with a dev_dbg() message noting that an\nendpoint was mapped.\n\nAdditional comments are added so that future users of this function\ncan more clearly understand what it provides."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-11T20:25:53.163Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/a9e099e29e925f8b31cfe53e8a786b9796f8e453"
        },
        {
          "url": "https://git.kernel.org/stable/c/b8a40a6dbfb0150c1081384caa9bbe28ce5d5060"
        },
        {
          "url": "https://git.kernel.org/stable/c/285f2a08841432fc3e498b1cd00cce5216cdf189"
        }
      ],
      "title": "cxl/region: Avoid null pointer dereference in region lookup",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-41084",
    "datePublished": "2024-07-29T15:48:00.323Z",
    "dateReserved": "2024-07-12T12:17:45.633Z",
    "dateUpdated": "2026-05-11T20:25:53.163Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2024-41084",
      "date": "2026-05-21",
      "epss": "0.00018",
      "percentile": "0.04835"
    },
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.4\", \"versionEndExcluding\": \"6.6.37\", \"matchCriteriaId\": \"99BA6BEA-A8FA-4C05-955A-F9CF38DD37DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.7\", \"versionEndExcluding\": \"6.9.8\", \"matchCriteriaId\": \"E95105F2-32E3-4C5F-9D18-7AEFD0E6275C\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncxl/region: Avoid null pointer dereference in region lookup\\n\\ncxl_dpa_to_region() looks up a region based on a memdev and DPA.\\nIt wrongly assumes an endpoint found mapping the DPA is also of\\na fully assembled region. When not true it leads to a null pointer\\ndereference looking up the region name.\\n\\nThis appears during testing of region lookup after a failure to\\nassemble a BIOS defined region or if the lookup raced with the\\nassembly of the BIOS defined region.\\n\\nFailure to clean up BIOS defined regions that fail assembly is an\\nissue in itself and a fix to that problem will alleviate some of\\nthe impact. It will not alleviate the race condition so let\u0027s harden\\nthis path.\\n\\nThe behavior change is that the kernel oops due to a null pointer\\ndereference is replaced with a dev_dbg() message noting that an\\nendpoint was mapped.\\n\\nAdditional comments are added so that future users of this function\\ncan more clearly understand what it provides.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: cxl/region: evitar la desreferencia del puntero nulo en la b\\u00fasqueda de regiones cxl_dpa_to_region() busca una regi\\u00f3n basada en memdev y DPA. Se supone err\\u00f3neamente que un endpoint encontrado mapeando el DPA tambi\\u00e9n pertenece a una regi\\u00f3n completamente ensamblada. Cuando no es cierto, se produce una desreferencia del puntero nulo al buscar el nombre de la regi\\u00f3n. Esto aparece durante la prueba de la b\\u00fasqueda de regiones despu\\u00e9s de un error al ensamblar una regi\\u00f3n definida por el BIOS o si la b\\u00fasqueda coincidi\\u00f3 con el ensamblaje de la regi\\u00f3n definida por el BIOS. No limpiar las regiones definidas por el BIOS que fallan en el ensamblaje es un problema en s\\u00ed mismo y una soluci\\u00f3n a ese problema aliviar\\u00e1 parte del impacto. Esto no aliviar\\u00e1 las condiciones de carrera, as\\u00ed que endurezcamos este camino. El cambio de comportamiento es que el kernel oops debido a una desreferencia de puntero nulo se reemplaza con un mensaje dev_dbg() que indica que se asign\\u00f3 un endpoint. Se agregan comentarios adicionales para que los futuros usuarios de esta funci\\u00f3n puedan comprender m\\u00e1s claramente lo que proporciona.\"}]",
      "id": "CVE-2024-41084",
      "lastModified": "2024-11-21T09:32:12.710",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
      "published": "2024-07-29T16:15:03.873",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/285f2a08841432fc3e498b1cd00cce5216cdf189\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/a9e099e29e925f8b31cfe53e8a786b9796f8e453\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/b8a40a6dbfb0150c1081384caa9bbe28ce5d5060\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/285f2a08841432fc3e498b1cd00cce5216cdf189\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/a9e099e29e925f8b31cfe53e8a786b9796f8e453\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/b8a40a6dbfb0150c1081384caa9bbe28ce5d5060\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-41084\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-29T16:15:03.873\",\"lastModified\":\"2024-11-21T09:32:12.710\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncxl/region: Avoid null pointer dereference in region lookup\\n\\ncxl_dpa_to_region() looks up a region based on a memdev and DPA.\\nIt wrongly assumes an endpoint found mapping the DPA is also of\\na fully assembled region. When not true it leads to a null pointer\\ndereference looking up the region name.\\n\\nThis appears during testing of region lookup after a failure to\\nassemble a BIOS defined region or if the lookup raced with the\\nassembly of the BIOS defined region.\\n\\nFailure to clean up BIOS defined regions that fail assembly is an\\nissue in itself and a fix to that problem will alleviate some of\\nthe impact. It will not alleviate the race condition so let\u0027s harden\\nthis path.\\n\\nThe behavior change is that the kernel oops due to a null pointer\\ndereference is replaced with a dev_dbg() message noting that an\\nendpoint was mapped.\\n\\nAdditional comments are added so that future users of this function\\ncan more clearly understand what it provides.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cxl/region: evitar la desreferencia del puntero nulo en la b\u00fasqueda de regiones cxl_dpa_to_region() busca una regi\u00f3n basada en memdev y DPA. Se supone err\u00f3neamente que un endpoint encontrado mapeando el DPA tambi\u00e9n pertenece a una regi\u00f3n completamente ensamblada. Cuando no es cierto, se produce una desreferencia del puntero nulo al buscar el nombre de la regi\u00f3n. Esto aparece durante la prueba de la b\u00fasqueda de regiones despu\u00e9s de un error al ensamblar una regi\u00f3n definida por el BIOS o si la b\u00fasqueda coincidi\u00f3 con el ensamblaje de la regi\u00f3n definida por el BIOS. No limpiar las regiones definidas por el BIOS que fallan en el ensamblaje es un problema en s\u00ed mismo y una soluci\u00f3n a ese problema aliviar\u00e1 parte del impacto. Esto no aliviar\u00e1 las condiciones de carrera, as\u00ed que endurezcamos este camino. El cambio de comportamiento es que el kernel oops debido a una desreferencia de puntero nulo se reemplaza con un mensaje dev_dbg() que indica que se asign\u00f3 un endpoint. Se agregan comentarios adicionales para que los futuros usuarios de esta funci\u00f3n puedan comprender m\u00e1s claramente lo que proporciona.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4\",\"versionEndExcluding\":\"6.6.37\",\"matchCriteriaId\":\"99BA6BEA-A8FA-4C05-955A-F9CF38DD37DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.9.8\",\"matchCriteriaId\":\"E95105F2-32E3-4C5F-9D18-7AEFD0E6275C\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/285f2a08841432fc3e498b1cd00cce5216cdf189\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a9e099e29e925f8b31cfe53e8a786b9796f8e453\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b8a40a6dbfb0150c1081384caa9bbe28ce5d5060\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/285f2a08841432fc3e498b1cd00cce5216cdf189\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a9e099e29e925f8b31cfe53e8a786b9796f8e453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b8a40a6dbfb0150c1081384caa9bbe28ce5d5060\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-07-29T15:48:00.323Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncxl/region: Avoid null pointer dereference in region lookup\\n\\ncxl_dpa_to_region() looks up a region based on a memdev and DPA.\\nIt wrongly assumes an endpoint found mapping the DPA is also of\\na fully assembled region. When not true it leads to a null pointer\\ndereference looking up the region name.\\n\\nThis appears during testing of region lookup after a failure to\\nassemble a BIOS defined region or if the lookup raced with the\\nassembly of the BIOS defined region.\\n\\nFailure to clean up BIOS defined regions that fail assembly is an\\nissue in itself and a fix to that problem will alleviate some of\\nthe impact. It will not alleviate the race condition so let\u0027s harden\\nthis path.\\n\\nThe behavior change is that the kernel oops due to a null pointer\\ndereference is replaced with a dev_dbg() message noting that an\\nendpoint was mapped.\\n\\nAdditional comments are added so that future users of this function\\ncan more clearly understand what it provides.\"}], \"affected\": [{\"product\": \"Linux\", \"vendor\": \"Linux\", \"defaultStatus\": \"unaffected\", \"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"programFiles\": [\"drivers/cxl/core/region.c\"], \"versions\": [{\"version\": \"0a105ab28a4d\", \"lessThan\": \"a9e099e29e92\", \"status\": \"affected\", \"versionType\": \"git\"}, {\"version\": \"0a105ab28a4d\", \"lessThan\": \"b8a40a6dbfb0\", \"status\": \"affected\", \"versionType\": \"git\"}, {\"version\": \"0a105ab28a4d\", \"lessThan\": \"285f2a088414\", \"status\": \"affected\", \"versionType\": \"git\"}]}, {\"product\": \"Linux\", \"vendor\": \"Linux\", \"defaultStatus\": \"affected\", \"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"programFiles\": [\"drivers/cxl/core/region.c\"], \"versions\": [{\"version\": \"6.4\", \"status\": \"affected\"}, {\"version\": \"0\", \"lessThan\": \"6.4\", \"status\": \"unaffected\", \"versionType\": \"custom\"}, {\"version\": \"6.6.37\", \"lessThanOrEqual\": \"6.6.*\", \"status\": \"unaffected\", \"versionType\": \"custom\"}, {\"version\": \"6.9.8\", \"lessThanOrEqual\": \"6.9.*\", \"status\": \"unaffected\", \"versionType\": \"custom\"}, {\"version\": \"6.10\", \"lessThanOrEqual\": \"*\", \"status\": \"unaffected\", \"versionType\": \"original_commit_for_fix\"}]}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/a9e099e29e925f8b31cfe53e8a786b9796f8e453\"}, {\"url\": \"https://git.kernel.org/stable/c/b8a40a6dbfb0150c1081384caa9bbe28ce5d5060\"}, {\"url\": \"https://git.kernel.org/stable/c/285f2a08841432fc3e498b1cd00cce5216cdf189\"}], \"title\": \"cxl/region: Avoid null pointer dereference in region lookup\", \"x_generator\": {\"engine\": \"bippy-c9c4e1df01b2\"}}, \"adp\": [{\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-41084\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:20:55.485513Z\"}}}], \"providerMetadata\": {\"shortName\": \"CISA-ADP\", \"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"dateUpdated\": \"2024-09-11T12:42:19.979Z\"}, \"title\": \"CISA ADP Vulnrichment\"}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-41084\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"Linux\", \"dateReserved\": \"2024-07-12T12:17:45.633Z\", \"datePublished\": \"2024-07-29T15:48:00.323Z\", \"dateUpdated\": \"2024-08-02T04:46:51.020Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…