In the Linux kernel, the following vulnerability has been resolved:
s390/dasd: fix error checks in dasdcopypair_store()
dasdaddbusid() can return an error via ERRPTR() if an allocation fails. However, two callsites in dasdcopypairstore() do not check the result, potentially resulting in a NULL pointer dereference. Fix this by checking the result with IS_ERR() and returning the error up the stack.
{ "vanir_signatures": [ { "digest": { "length": 1570.0, "function_hash": "257350528062256812020235700083921386085" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8e64d2356cbc800b4cd0e3e614797f76bcf0cdb8", "signature_type": "Function", "target": { "function": "dasd_copy_pair_store", "file": "drivers/s390/block/dasd_devmap.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2024-42320-07da94b3" }, { "digest": { "line_hashes": [ "129264669182089406504624865105747322091", "275772378186897823314998962422361326598", "133790304076938898913907592478156914324", "182736978354196320757993404582429600728", "290943294778374263422890727606846597658", "106940197487652031446806827875255734153", "112288663665251173272197285657860607087", "30561922485952665433225475113773508799" ], "threshold": 0.9 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e511167e65d332d07b3c7a3d5a741ee9c19a8c27", "signature_type": "Line", "target": { "file": "drivers/s390/block/dasd_devmap.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2024-42320-0dc4a283" }, { "digest": { "line_hashes": [ "129264669182089406504624865105747322091", "275772378186897823314998962422361326598", "133790304076938898913907592478156914324", "182736978354196320757993404582429600728", "290943294778374263422890727606846597658", "106940197487652031446806827875255734153", "112288663665251173272197285657860607087", "30561922485952665433225475113773508799" ], "threshold": 0.9 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68d4c3722290ad300c295fb3435e835d200d5cb2", "signature_type": "Line", "target": { "file": "drivers/s390/block/dasd_devmap.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2024-42320-15a6ff51" }, { "digest": { "length": 1570.0, "function_hash": "257350528062256812020235700083921386085" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e511167e65d332d07b3c7a3d5a741ee9c19a8c27", "signature_type": "Function", "target": { "function": "dasd_copy_pair_store", "file": "drivers/s390/block/dasd_devmap.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2024-42320-4a56aaaf" }, { "digest": { "line_hashes": [ "129264669182089406504624865105747322091", "275772378186897823314998962422361326598", "133790304076938898913907592478156914324", "182736978354196320757993404582429600728", "290943294778374263422890727606846597658", "106940197487652031446806827875255734153", "112288663665251173272197285657860607087", "30561922485952665433225475113773508799" ], "threshold": 0.9 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8e64d2356cbc800b4cd0e3e614797f76bcf0cdb8", "signature_type": "Line", "target": { "file": "drivers/s390/block/dasd_devmap.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2024-42320-5249ce78" }, { "digest": { "length": 1570.0, "function_hash": "257350528062256812020235700083921386085" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68d4c3722290ad300c295fb3435e835d200d5cb2", "signature_type": "Function", "target": { "function": "dasd_copy_pair_store", "file": "drivers/s390/block/dasd_devmap.c" }, "deprecated": false, "signature_version": "v1", "id": "CVE-2024-42320-af821423" } ] }