In the Linux kernel, the following vulnerability has been resolved:
eventfs: Fix a possible null pointer dereference in eventfsfindevents()
In function eventfsfindevents,there is a potential null pointer that may be caused by calling updateeventsattr which will perform some operations on the members of the ei struct when ei is NULL.
Hence,When ei->is_freed is set,return NULL directly.
[
{
"signature_type": "Function",
"digest": {
"length": 247.0,
"function_hash": "165712796411442094777910169385484429725"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d4e9a968738bf66d3bb852dd5588d4c7afd6d7f4",
"deprecated": false,
"id": "CVE-2024-39470-42c2587b",
"target": {
"function": "eventfs_find_events",
"file": "fs/tracefs/event_inode.c"
},
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"length": 247.0,
"function_hash": "165712796411442094777910169385484429725"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5ade5fbdbbb1f023bb70730ba4d74146c8bc7eb9",
"deprecated": false,
"id": "CVE-2024-39470-4af3f572",
"target": {
"function": "eventfs_find_events",
"file": "fs/tracefs/event_inode.c"
},
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"122889088795962591614156538861302065770",
"284784890647209012378813229679263296428",
"238878107352146866540128239835643895623",
"70839959578275209097018036958097194740",
"191926210873676857923765030555677052945",
"151692864498617320207964121375723980950",
"129450114171328661878378851090195503961"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d4e9a968738bf66d3bb852dd5588d4c7afd6d7f4",
"deprecated": false,
"id": "CVE-2024-39470-531de230",
"target": {
"file": "fs/tracefs/event_inode.c"
},
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"122889088795962591614156538861302065770",
"284784890647209012378813229679263296428",
"238878107352146866540128239835643895623",
"70839959578275209097018036958097194740",
"191926210873676857923765030555677052945",
"151692864498617320207964121375723980950",
"129450114171328661878378851090195503961"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5ade5fbdbbb1f023bb70730ba4d74146c8bc7eb9",
"deprecated": false,
"id": "CVE-2024-39470-6f4a09de",
"target": {
"file": "fs/tracefs/event_inode.c"
},
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"122889088795962591614156538861302065770",
"284784890647209012378813229679263296428",
"238878107352146866540128239835643895623",
"70839959578275209097018036958097194740",
"191926210873676857923765030555677052945",
"151692864498617320207964121375723980950",
"129450114171328661878378851090195503961"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7a1b2d138189375ed1dcd7d0851118230221bd1d",
"deprecated": false,
"id": "CVE-2024-39470-a5e0087a",
"target": {
"file": "fs/tracefs/event_inode.c"
},
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"length": 247.0,
"function_hash": "165712796411442094777910169385484429725"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7a1b2d138189375ed1dcd7d0851118230221bd1d",
"deprecated": false,
"id": "CVE-2024-39470-e396980b",
"target": {
"function": "eventfs_find_events",
"file": "fs/tracefs/event_inode.c"
},
"signature_version": "v1"
}
]