{"id":"CVE-2024-46677","summary":"gtp: fix a potential NULL pointer dereference","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ngtp: fix a potential NULL pointer dereference\n\nWhen sockfd_lookup() fails, gtp_encap_enable_socket() returns a\nNULL pointer, but its callers only check for error pointers thus miss\nthe NULL pointer case.\n\nFix it by returning an error pointer with the error code carried from\nsockfd_lookup().\n\n(I found this bug during code inspection.)","modified":"2026-04-02T12:19:19.483626Z","published":"2024-09-13T05:29:12.203Z","related":["SUSE-SU-2024:3551-1","SUSE-SU-2024:3553-1","SUSE-SU-2024:3559-1","SUSE-SU-2024:3561-1","SUSE-SU-2024:3564-1","SUSE-SU-2024:3566-1","SUSE-SU-2024:3569-1","SUSE-SU-2024:3587-1","SUSE-SU-2024:3591-1","SUSE-SU-2024:3592-1","SUSE-SU-2025:20073-1","SUSE-SU-2025:20077-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46677.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/28c67f0f84f889fe9f4cbda8354132b20dc9212d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4643b91691e969b1b9ad54bf552d7a990cfa3b87"},{"type":"WEB","url":"https://git.kernel.org/stable/c/612edd35f2a3910ab1f61c1f2338889d4ba99fa2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/620fe9809752fae91b4190e897b81ed9976dfb39"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8bbb9e4e0e66a39282e582d0440724055404b38c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bdd99e5f0ad5fa727b16f2101fe880aa2bff2f8e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/defd8b3c37b0f9cb3e0f60f47d3d78d459d57fda"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e8b9930b0eb045d19e883c65ff9676fc89320c70"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46677.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46677"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1e3a3abd8b28cfda9d0d0167e50e0fe11bc372a9"},{"fixed":"620fe9809752fae91b4190e897b81ed9976dfb39"},{"fixed":"bdd99e5f0ad5fa727b16f2101fe880aa2bff2f8e"},{"fixed":"8bbb9e4e0e66a39282e582d0440724055404b38c"},{"fixed":"4643b91691e969b1b9ad54bf552d7a990cfa3b87"},{"fixed":"e8b9930b0eb045d19e883c65ff9676fc89320c70"},{"fixed":"28c67f0f84f889fe9f4cbda8354132b20dc9212d"},{"fixed":"612edd35f2a3910ab1f61c1f2338889d4ba99fa2"},{"fixed":"defd8b3c37b0f9cb3e0f60f47d3d78d459d57fda"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-46677.json"}}],"schema_version":"1.7.5"}