{"vulnerability": "CVE-2024-49987", "sightings": [{"uuid": "c8f078f2-c543-404a-a56d-20ea1c25d2eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49987", "type": "seen", "source": "https://t.me/cvedetector/8509", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49987 - Linux Kernel bpftool Null Pointer Voor tratamiento\", \n  \"Content\": \"CVE ID : CVE-2024-49987 \nPublished : Oct. 21, 2024, 6:15 p.m. | 44\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nbpftool: Fix undefined behavior in qsort(NULL, 0, ...)  \n  \nWhen netfilter has no entry to display, qsort is called with  \nqsort(NULL, 0, ...). This results in undefined behavior, as UBSan  \nreports:  \n  \nnet.c:827:2: runtime error: null pointer passed as argument 1, which is declared to never be null  \n  \nAlthough the C standard does not explicitly state whether calling qsort  \nwith a NULL pointer when the size is 0 constitutes undefined behavior,  \nSection 7.1.4 of the C standard (Use of library functions) mentions:  \n  \n\"Each of the following statements applies unless explicitly stated  \notherwise in the detailed descriptions that follow: If an argument to a  \nfunction has an invalid value (such as a value outside the domain of  \nthe function, or a pointer outside the address space of the program, or  \na null pointer, or a pointer to non-modifiable storage when the  \ncorresponding parameter is not const-qualified) or a type (after  \npromotion) not expected by a function with variable number of  \narguments, the behavior is undefined.\"  \n  \nTo avoid this, add an early return when nf_link_info is NULL to prevent  \ncalling qsort with a NULL pointer. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-21T21:01:55.000000Z"}, {"uuid": "51fec8ae-5341-4917-908e-23c7aa410447", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49987", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16648", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49987\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nbpftool: Fix undefined behavior in qsort(NULL, 0, ...)\n\nWhen netfilter has no entry to display, qsort is called with\nqsort(NULL, 0, ...). This results in undefined behavior, as UBSan\nreports:\n\nnet.c:827:2: runtime error: null pointer passed as argument 1, which is declared to never be null\n\nAlthough the C standard does not explicitly state whether calling qsort\nwith a NULL pointer when the size is 0 constitutes undefined behavior,\nSection 7.1.4 of the C standard (Use of library functions) mentions:\n\n\"Each of the following statements applies unless explicitly stated\notherwise in the detailed descriptions that follow: If an argument to a\nfunction has an invalid value (such as a value outside the domain of\nthe function, or a pointer outside the address space of the program, or\na null pointer, or a pointer to non-modifiable storage when the\ncorresponding parameter is not const-qualified) or a type (after\npromotion) not expected by a function with variable number of\narguments, the behavior is undefined.\"\n\nTo avoid this, add an early return when nf_link_info is NULL to prevent\ncalling qsort with a NULL pointer.\n\ud83d\udccf Published: 2024-10-21T18:02:31.209Z\n\ud83d\udccf Modified: 2025-05-16T07:25:08.183Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/c2d9f9a7837ab29ccae0c42252f17d436bf0a501\n2. https://git.kernel.org/stable/c/2e0f6f33f2aa87493b365a38a8fd87b8854b7734\n3. https://git.kernel.org/stable/c/c208b02827eb642758cef65641995fd3f38c89af\n4. https://git.kernel.org/stable/c/f04e2ad394e2755d0bb2d858ecb5598718bf00d5", "creation_timestamp": "2025-05-16T07:33:59.000000Z"}, {"uuid": "8a9da9a8-a78d-4e98-bcd1-af91d320069b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-49987", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}]}