In the Linux kernel, the following vulnerability has been resolved:
s390/mm: Add NULL pointer check to crsttablefree() basecrstfree()
crsttablefree() used to work with NULL pointers before the conversion to ptdescs. Since crsttablefree() can be called with a NULL pointer (error handling in crsttableupgrade() add an explicit check.
Also add the same check to basecrstfree() for consistency reasons.
In real life this should not happen, since order two GFPKERNEL allocations will not fail, unless FAILPAGE_ALLOC is enabled and used.
[
{
"id": "CVE-2024-42235-0dbaea03",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"126325426545987546050462979922405757035",
"266651374552096202019081620021207122140",
"237231298532227505668282671290346444944",
"36619879069205201763134913205576760209",
"276233243047896759990776599650229056274",
"266970309887993700346857365349430808176",
"111687656099282594432045371339068006594",
"79542859295905373763572798453282010872"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f80bd8bb6f380bc265834c46058d38b34174813e",
"target": {
"file": "arch/s390/mm/pgalloc.c"
}
},
{
"id": "CVE-2024-42235-37097b17",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"294722734455413158226338376678540788348",
"266651374552096202019081620021207122140",
"237231298532227505668282671290346444944",
"36619879069205201763134913205576760209",
"276233243047896759990776599650229056274",
"266970309887993700346857365349430808176",
"111687656099282594432045371339068006594",
"79542859295905373763572798453282010872"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@794fa52b94637d6b2e8c9474fbe3983af5c9f046",
"target": {
"file": "arch/s390/mm/pgalloc.c"
}
},
{
"id": "CVE-2024-42235-562e55d2",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"126325426545987546050462979922405757035",
"266651374552096202019081620021207122140",
"237231298532227505668282671290346444944",
"36619879069205201763134913205576760209",
"276233243047896759990776599650229056274",
"266970309887993700346857365349430808176",
"111687656099282594432045371339068006594",
"79542859295905373763572798453282010872"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b5efb63acf7bddaf20eacfcac654c25c446eabe8",
"target": {
"file": "arch/s390/mm/pgalloc.c"
}
},
{
"id": "CVE-2024-42235-5639d7b8",
"signature_version": "v1",
"digest": {
"length": 86.0,
"function_hash": "266056352410532055804398798031554784364"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b5efb63acf7bddaf20eacfcac654c25c446eabe8",
"target": {
"file": "arch/s390/mm/pgalloc.c",
"function": "base_crst_free"
}
},
{
"id": "CVE-2024-42235-56e76e8a",
"signature_version": "v1",
"digest": {
"length": 95.0,
"function_hash": "67100962345306156767728172474541236594"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f80bd8bb6f380bc265834c46058d38b34174813e",
"target": {
"file": "arch/s390/mm/pgalloc.c",
"function": "crst_table_free"
}
},
{
"id": "CVE-2024-42235-5825ae58",
"signature_version": "v1",
"digest": {
"length": 86.0,
"function_hash": "266056352410532055804398798031554784364"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f80bd8bb6f380bc265834c46058d38b34174813e",
"target": {
"file": "arch/s390/mm/pgalloc.c",
"function": "base_crst_free"
}
},
{
"id": "CVE-2024-42235-6af46773",
"signature_version": "v1",
"digest": {
"length": 86.0,
"function_hash": "266056352410532055804398798031554784364"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@794fa52b94637d6b2e8c9474fbe3983af5c9f046",
"target": {
"file": "arch/s390/mm/pgalloc.c",
"function": "base_crst_free"
}
},
{
"id": "CVE-2024-42235-8b872712",
"signature_version": "v1",
"digest": {
"length": 95.0,
"function_hash": "67100962345306156767728172474541236594"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@794fa52b94637d6b2e8c9474fbe3983af5c9f046",
"target": {
"file": "arch/s390/mm/pgalloc.c",
"function": "crst_table_free"
}
},
{
"id": "CVE-2024-42235-b7d92a3e",
"signature_version": "v1",
"digest": {
"length": 95.0,
"function_hash": "67100962345306156767728172474541236594"
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b5efb63acf7bddaf20eacfcac654c25c446eabe8",
"target": {
"file": "arch/s390/mm/pgalloc.c",
"function": "crst_table_free"
}
}
]