{"id":"CVE-2024-42286","summary":"scsi: qla2xxx: validate nvme_local_port correctly","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: validate nvme_local_port correctly\n\nThe driver load failed with error message,\n\nqla2xxx [0000:04:00.0]-ffff:0: register_localport failed: ret=ffffffef\n\nand with a kernel crash,\n\n\tBUG: unable to handle kernel NULL pointer dereference at 0000000000000070\n\tWorkqueue: events_unbound qla_register_fcport_fn [qla2xxx]\n\tRIP: 0010:nvme_fc_register_remoteport+0x16/0x430 [nvme_fc]\n\tRSP: 0018:ffffaaa040eb3d98 EFLAGS: 00010282\n\tRAX: 0000000000000000 RBX: ffff9dfb46b78c00 RCX: 0000000000000000\n\tRDX: ffff9dfb46b78da8 RSI: ffffaaa040eb3e08 RDI: 0000000000000000\n\tRBP: ffff9dfb612a0a58 R08: ffffffffaf1d6270 R09: 3a34303a30303030\n\tR10: 34303a303030305b R11: 2078787832616c71 R12: ffff9dfb46b78dd4\n\tR13: ffff9dfb46b78c24 R14: ffff9dfb41525300 R15: ffff9dfb46b78da8\n\tFS:  0000000000000000(0000) GS:ffff9dfc67c00000(0000) knlGS:0000000000000000\n\tCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\tCR2: 0000000000000070 CR3: 000000018da10004 CR4: 00000000000206f0\n\tCall Trace:\n\tqla_nvme_register_remote+0xeb/0x1f0 [qla2xxx]\n\t? qla2x00_dfs_create_rport+0x231/0x270 [qla2xxx]\n\tqla2x00_update_fcport+0x2a1/0x3c0 [qla2xxx]\n\tqla_register_fcport_fn+0x54/0xc0 [qla2xxx]\n\nExit the qla_nvme_register_remote() function when qla_nvme_register_hba()\nfails and correctly validate nvme_local_port.","modified":"2026-03-20T12:38:45.897458Z","published":"2024-08-17T09:08:52.036Z","related":["MGASA-2024-0309","MGASA-2024-0310","SUSE-SU-2024:3189-1","SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3251-1","SUSE-SU-2024:3252-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3483-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42286.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3eac973eb5cb2b874b3918f924798afc5affd46b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/549aac9655320c9b245a24271b204668c5d40430"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7cec2c3bfe84539c415f5e16f989228eba1d2f1e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a3ab508a4853a9f5ae25a7816a4889f09938f63c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cde43031df533751b4ead37d173922feee2f550f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e1f010844443c389bc552884ac5cfa47de34d54c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eb1d4ce2609584eeb7694866f34d4b213caa3af9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f6be298cc1042f24d521197af29c7c4eb95af4d5"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42286.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42286"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8777e4314d397c4e3615dc02fe8537e571e3922f"},{"fixed":"549aac9655320c9b245a24271b204668c5d40430"},{"fixed":"e1f010844443c389bc552884ac5cfa47de34d54c"},{"fixed":"a3ab508a4853a9f5ae25a7816a4889f09938f63c"},{"fixed":"cde43031df533751b4ead37d173922feee2f550f"},{"fixed":"7cec2c3bfe84539c415f5e16f989228eba1d2f1e"},{"fixed":"f6be298cc1042f24d521197af29c7c4eb95af4d5"},{"fixed":"3eac973eb5cb2b874b3918f924798afc5affd46b"},{"fixed":"eb1d4ce2609584eeb7694866f34d4b213caa3af9"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42286.json"}}],"schema_version":"1.7.5"}