{"id":"CVE-2024-27046","summary":"nfp: flower: handle acti_netdevs allocation failure","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnfp: flower: handle acti_netdevs allocation failure\n\nThe kmalloc_array() in nfp_fl_lag_do_work() will return null, if\nthe physical memory has run out. As a result, if we dereference\nthe acti_netdevs, the null pointer dereference bugs will happen.\n\nThis patch adds a check to judge whether allocation failure occurs.\nIf it happens, the delayed work will be rescheduled and try again.","modified":"2026-03-20T12:35:22.270175Z","published":"2024-05-01T12:54:21.725Z","related":["ALSA-2024:4928","SUSE-SU-2024:1643-1","SUSE-SU-2024:1644-1","SUSE-SU-2024:1646-1","SUSE-SU-2024:1659-1","SUSE-SU-2024:1663-1","SUSE-SU-2024:1870-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20249-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27046.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0d387dc503f9a53e6d1f6e9dd0292d38f083eba5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3b1e8a617eb0f4cdc19def530047a95b5abde07d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/408ba7fd04f959c61b50db79c983484312fea642"},{"type":"WEB","url":"https://git.kernel.org/stable/c/84e95149bd341705f0eca6a7fcb955c548805002"},{"type":"WEB","url":"https://git.kernel.org/stable/c/928705e341010dd910fdece61ccb974f494a758f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9d8eb1238377cd994829f9162ae396a84ae037b2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c8df9203bf22c66fa26e8d8c7f8ce181cf88099d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c9b4e220dd18f79507803f38a55d53b483f6c9c3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d746889db75a76aeee95fb705b8e1ac28c684a2e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27046.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27046"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"bb9a8d031140f186d13d82f57b0f5646d596652f"},{"fixed":"d746889db75a76aeee95fb705b8e1ac28c684a2e"},{"fixed":"3b1e8a617eb0f4cdc19def530047a95b5abde07d"},{"fixed":"928705e341010dd910fdece61ccb974f494a758f"},{"fixed":"0d387dc503f9a53e6d1f6e9dd0292d38f083eba5"},{"fixed":"c9b4e220dd18f79507803f38a55d53b483f6c9c3"},{"fixed":"408ba7fd04f959c61b50db79c983484312fea642"},{"fixed":"c8df9203bf22c66fa26e8d8c7f8ce181cf88099d"},{"fixed":"9d8eb1238377cd994829f9162ae396a84ae037b2"},{"fixed":"84e95149bd341705f0eca6a7fcb955c548805002"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27046.json"}}],"schema_version":"1.7.5"}