In the Linux kernel, the following vulnerability has been resolved:
ipvs: properly dereference pe in ipvsadd_service
Use pe directly to resolve sparse warning:
net/netfilter/ipvs/ipvsctl.c:1471:27: warning: dereference of noderef expression
[
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/netfilter/ipvs/ip_vs_ctl.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b2c664df3bb46aabac6a5fd78aaa5bd614cfad97",
"digest": {
"line_hashes": [
"280474083207939587729174000743184740282",
"304521756430821351832405902984980669856",
"8911580816417381618621262473889508634",
"278082942391003041952096616549162568297",
"268096442383776249629552576298525136931",
"278562712317972793517957447650696554335",
"58562763822266683300555714672057458367",
"285480027120915266500080924947685091288",
"33600808609160761649389518687236961450",
"305384323586364153348730585024956392126",
"218942251450050533224192507506508478022"
],
"threshold": 0.9
},
"id": "CVE-2024-42322-25a6c740"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/netfilter/ipvs/ip_vs_ctl.c",
"function": "ip_vs_add_service"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@211168339657f36f32fb597afd0e3ac82d726119",
"digest": {
"length": 2788.0,
"function_hash": "93939935792087641765372849144869274280"
},
"id": "CVE-2024-42322-5252f1f0"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/netfilter/ipvs/ip_vs_ctl.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@211168339657f36f32fb597afd0e3ac82d726119",
"digest": {
"line_hashes": [
"280474083207939587729174000743184740282",
"304521756430821351832405902984980669856",
"8911580816417381618621262473889508634",
"278082942391003041952096616549162568297",
"268096442383776249629552576298525136931",
"278562712317972793517957447650696554335",
"58562763822266683300555714672057458367",
"285480027120915266500080924947685091288",
"33600808609160761649389518687236961450",
"305384323586364153348730585024956392126",
"218942251450050533224192507506508478022",
"301610913302372527241476816267476766040"
],
"threshold": 0.9
},
"id": "CVE-2024-42322-6cdc48f6"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/netfilter/ipvs/ip_vs_ctl.c",
"function": "ip_vs_add_service"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3dd428039e06e1967ce294e2cd6342825aaaad77",
"digest": {
"length": 2648.0,
"function_hash": "65608652041560944251686496846258872998"
},
"id": "CVE-2024-42322-a3fe8fa5"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/netfilter/ipvs/ip_vs_ctl.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cbd070a4ae62f119058973f6d2c984e325bce6e7",
"digest": {
"line_hashes": [
"297260329098854200622134749355121064406",
"108129120629188222336404907788468460454",
"48347005011205304239065746823194454619",
"278082942391003041952096616549162568297",
"268096442383776249629552576298525136931",
"278562712317972793517957447650696554335",
"58562763822266683300555714672057458367",
"285480027120915266500080924947685091288",
"51521258649002551876055255028647474526",
"74670104561220015320142753736260105323",
"267607695571685840804464359635734799235"
],
"threshold": 0.9
},
"id": "CVE-2024-42322-dc881d0f"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/netfilter/ipvs/ip_vs_ctl.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3dd428039e06e1967ce294e2cd6342825aaaad77",
"digest": {
"line_hashes": [
"297260329098854200622134749355121064406",
"108129120629188222336404907788468460454",
"48347005011205304239065746823194454619",
"278082942391003041952096616549162568297",
"268096442383776249629552576298525136931",
"278562712317972793517957447650696554335",
"58562763822266683300555714672057458367",
"285480027120915266500080924947685091288",
"51521258649002551876055255028647474526",
"74670104561220015320142753736260105323",
"267607695571685840804464359635734799235"
],
"threshold": 0.9
},
"id": "CVE-2024-42322-e2086439"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/netfilter/ipvs/ip_vs_ctl.c",
"function": "ip_vs_add_service"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b2c664df3bb46aabac6a5fd78aaa5bd614cfad97",
"digest": {
"length": 2788.0,
"function_hash": "93939935792087641765372849144869274280"
},
"id": "CVE-2024-42322-e9683263"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "net/netfilter/ipvs/ip_vs_ctl.c",
"function": "ip_vs_add_service"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cbd070a4ae62f119058973f6d2c984e325bce6e7",
"digest": {
"length": 2648.0,
"function_hash": "65608652041560944251686496846258872998"
},
"id": "CVE-2024-42322-ea99ff73"
}
]