In the Linux kernel, the following vulnerability has been resolved:
gfs2: Fix NULL pointer dereference in gfs2logflush
In gfs2jindexfree(), set sdp->sdjdesc to NULL under the log flush lock to provide exclusion against gfs2log_flush().
In gfs2logflush(), check if sdp->sdjdesc is non-NULL before dereferencing it. Otherwise, we could run into a NULL pointer dereference when outstanding glock work races with an unmount (glockworkfunc -> runqueue -> doxmote -> inodegosync -> gfs2log_flush).
[
{
"digest": {
"length": 502.0,
"function_hash": "34844702463625949536494213614969652829"
},
"target": {
"function": "gfs2_jindex_free",
"file": "fs/gfs2/super.c"
},
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3429ef5f50909cee9e498c50f0c499b9397116ce",
"signature_version": "v1",
"id": "CVE-2024-42079-04db239e"
},
{
"digest": {
"length": 502.0,
"function_hash": "34844702463625949536494213614969652829"
},
"target": {
"function": "gfs2_jindex_free",
"file": "fs/gfs2/super.c"
},
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f54f9d5368a4e92ede7dd078a62788dae3a7c6ef",
"signature_version": "v1",
"id": "CVE-2024-42079-148de035"
},
{
"digest": {
"length": 3436.0,
"function_hash": "307393804346793734188167552336680241576"
},
"target": {
"function": "gfs2_log_flush",
"file": "fs/gfs2/log.c"
},
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35264909e9d1973ab9aaa2a1b07cda70f12bb828",
"signature_version": "v1",
"id": "CVE-2024-42079-1c9e4d86"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"159155343023476878434378365324794192256",
"279910530225176081849303520338381638345",
"84620483997899336855259400088100946425",
"130449245780465563430710115902438945640"
]
},
"target": {
"file": "fs/gfs2/log.c"
},
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f54f9d5368a4e92ede7dd078a62788dae3a7c6ef",
"signature_version": "v1",
"id": "CVE-2024-42079-383f613e"
},
{
"digest": {
"length": 502.0,
"function_hash": "34844702463625949536494213614969652829"
},
"target": {
"function": "gfs2_jindex_free",
"file": "fs/gfs2/super.c"
},
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35264909e9d1973ab9aaa2a1b07cda70f12bb828",
"signature_version": "v1",
"id": "CVE-2024-42079-3db56e11"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"188690836885773875884366771476331335553",
"216978054477630449797072632118800855427",
"256747848050709288301401354448833535714",
"323607117613840876176851236549515728261",
"170615767788512839079313435749655036340",
"314036672913991263425518540512314838227"
]
},
"target": {
"file": "fs/gfs2/super.c"
},
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f54f9d5368a4e92ede7dd078a62788dae3a7c6ef",
"signature_version": "v1",
"id": "CVE-2024-42079-4fd9b6d0"
},
{
"digest": {
"length": 3436.0,
"function_hash": "307393804346793734188167552336680241576"
},
"target": {
"function": "gfs2_log_flush",
"file": "fs/gfs2/log.c"
},
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3429ef5f50909cee9e498c50f0c499b9397116ce",
"signature_version": "v1",
"id": "CVE-2024-42079-52cff307"
},
{
"digest": {
"length": 3436.0,
"function_hash": "307393804346793734188167552336680241576"
},
"target": {
"function": "gfs2_log_flush",
"file": "fs/gfs2/log.c"
},
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f54f9d5368a4e92ede7dd078a62788dae3a7c6ef",
"signature_version": "v1",
"id": "CVE-2024-42079-55b023e1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"159155343023476878434378365324794192256",
"279910530225176081849303520338381638345",
"84620483997899336855259400088100946425",
"130449245780465563430710115902438945640"
]
},
"target": {
"file": "fs/gfs2/log.c"
},
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3429ef5f50909cee9e498c50f0c499b9397116ce",
"signature_version": "v1",
"id": "CVE-2024-42079-7120eaa8"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"188690836885773875884366771476331335553",
"216978054477630449797072632118800855427",
"256747848050709288301401354448833535714",
"323607117613840876176851236549515728261",
"170615767788512839079313435749655036340",
"314036672913991263425518540512314838227"
]
},
"target": {
"file": "fs/gfs2/super.c"
},
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3429ef5f50909cee9e498c50f0c499b9397116ce",
"signature_version": "v1",
"id": "CVE-2024-42079-a7cc1b64"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"159155343023476878434378365324794192256",
"279910530225176081849303520338381638345",
"84620483997899336855259400088100946425",
"130449245780465563430710115902438945640"
]
},
"target": {
"file": "fs/gfs2/log.c"
},
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35264909e9d1973ab9aaa2a1b07cda70f12bb828",
"signature_version": "v1",
"id": "CVE-2024-42079-d74b6e9f"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"188690836885773875884366771476331335553",
"216978054477630449797072632118800855427",
"256747848050709288301401354448833535714",
"323607117613840876176851236549515728261",
"170615767788512839079313435749655036340",
"314036672913991263425518540512314838227"
]
},
"target": {
"file": "fs/gfs2/super.c"
},
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@35264909e9d1973ab9aaa2a1b07cda70f12bb828",
"signature_version": "v1",
"id": "CVE-2024-42079-ee2a3d3f"
}
]