In the Linux kernel, the following vulnerability has been resolved:
null_blk: fix validation of block size
Block size should be between 512 and PAGE_SIZE and be a power of 2. The current check does not validate this, so update the check.
Without this patch, null_blk would Oops due to a null pointer deref when loaded with bs=1536 [1].
[axboe: remove unnecessary braces and != 0 check]
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"336929131172718900181813188451124212951",
"28176563174399515889597542304163269470",
"23234939270153436347335905814495860814",
"32567703953816602700955045676667663751",
"197351568230303623454327186729457596156"
]
},
"id": "CVE-2024-41077-2d2b6f52",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@08f03186b96e25e3154916a2e70732557c770ea7",
"target": {
"file": "drivers/block/null_blk/main.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1279.0,
"function_hash": "151917165469834460978644785397276500442"
},
"id": "CVE-2024-41077-a1153908",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9625afe1dd4a158a14bb50f81af9e2dac634c0b1",
"target": {
"file": "drivers/block/null_blk/main.c",
"function": "null_validate_conf"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"267874283823320445713323220799991224508",
"37625863018754468642260722664671707980",
"28472903959700314936713706628179309549",
"311842299024768106456358251450074015857",
"256666243706602509172675499069647482232"
]
},
"id": "CVE-2024-41077-a3f745c0",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f92409a9da02f27d05d713bff5f865e386cef9b3",
"target": {
"file": "drivers/block/null_blk/main.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1468.0,
"function_hash": "9385465049905978664280119752779565601"
},
"id": "CVE-2024-41077-a728b981",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2772ed2fc075eef7df3789906fc9dae01e4e132e",
"target": {
"file": "drivers/block/null_blk/main.c",
"function": "null_validate_conf"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1450.0,
"function_hash": "50403506305260663236369007623725980495"
},
"id": "CVE-2024-41077-beb8dc2c",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c462ecd659b5fce731f1d592285832fd6ad54053",
"target": {
"file": "drivers/block/null_blk/main.c",
"function": "null_validate_conf"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"336929131172718900181813188451124212951",
"28176563174399515889597542304163269470",
"23234939270153436347335905814495860814",
"32567703953816602700955045676667663751",
"197351568230303623454327186729457596156"
]
},
"id": "CVE-2024-41077-c4b9bd79",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2772ed2fc075eef7df3789906fc9dae01e4e132e",
"target": {
"file": "drivers/block/null_blk/main.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"336929131172718900181813188451124212951",
"28176563174399515889597542304163269470",
"23234939270153436347335905814495860814",
"32567703953816602700955045676667663751",
"197351568230303623454327186729457596156"
]
},
"id": "CVE-2024-41077-c6d3373d",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9625afe1dd4a158a14bb50f81af9e2dac634c0b1",
"target": {
"file": "drivers/block/null_blk/main.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"267874283823320445713323220799991224508",
"37625863018754468642260722664671707980",
"28472903959700314936713706628179309549",
"311842299024768106456358251450074015857",
"256666243706602509172675499069647482232"
]
},
"id": "CVE-2024-41077-dd078d8a",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c462ecd659b5fce731f1d592285832fd6ad54053",
"target": {
"file": "drivers/block/null_blk/main.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1468.0,
"function_hash": "9385465049905978664280119752779565601"
},
"id": "CVE-2024-41077-e8252466",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@08f03186b96e25e3154916a2e70732557c770ea7",
"target": {
"file": "drivers/block/null_blk/main.c",
"function": "null_validate_conf"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1450.0,
"function_hash": "50403506305260663236369007623725980495"
},
"id": "CVE-2024-41077-e9136313",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f92409a9da02f27d05d713bff5f865e386cef9b3",
"target": {
"file": "drivers/block/null_blk/main.c",
"function": "null_validate_conf"
}
}
]