In the Linux kernel, the following vulnerability has been resolved:
tracing/probes: fix error check in parsebtffield()
btffindstructmember() might return NULL or an error via the ERRPTR() macro. However, its caller in parsebtffield() only checks for the NULL condition. Fix this by using IS_ERR() and returning the error up the stack.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36481.json"
}[
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"193029095031344831030465868152146053442",
"129185116057434334577940901874155432070",
"211555830909706249437934572598388106636",
"1594499225893448188587613150602929318"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "kernel/trace/trace_probe.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad4b202da2c498fefb69e5d87f67b946e7fe1e6a",
"id": "CVE-2024-36481-370a2858",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"193029095031344831030465868152146053442",
"129185116057434334577940901874155432070",
"211555830909706249437934572598388106636",
"1594499225893448188587613150602929318"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "kernel/trace/trace_probe.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ed468edfeb54c7202e559eba74c25fac6a0dad0",
"id": "CVE-2024-36481-388c3c9c",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 1394.0,
"function_hash": "102246512831113447828528881160241182569"
},
"signature_version": "v1",
"target": {
"function": "parse_btf_field",
"file": "kernel/trace/trace_probe.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ed468edfeb54c7202e559eba74c25fac6a0dad0",
"id": "CVE-2024-36481-936557c0",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 1394.0,
"function_hash": "102246512831113447828528881160241182569"
},
"signature_version": "v1",
"target": {
"function": "parse_btf_field",
"file": "kernel/trace/trace_probe.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e569eb34970281438e2b48a3ef11c87459fcfbcb",
"id": "CVE-2024-36481-9ba8caa0",
"deprecated": false
},
{
"signature_type": "Function",
"digest": {
"length": 1394.0,
"function_hash": "102246512831113447828528881160241182569"
},
"signature_version": "v1",
"target": {
"function": "parse_btf_field",
"file": "kernel/trace/trace_probe.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad4b202da2c498fefb69e5d87f67b946e7fe1e6a",
"id": "CVE-2024-36481-a7cfe9e2",
"deprecated": false
},
{
"signature_type": "Line",
"digest": {
"line_hashes": [
"193029095031344831030465868152146053442",
"129185116057434334577940901874155432070",
"211555830909706249437934572598388106636",
"1594499225893448188587613150602929318"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "kernel/trace/trace_probe.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e569eb34970281438e2b48a3ef11c87459fcfbcb",
"id": "CVE-2024-36481-d18fe031",
"deprecated": false
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-36481.json"