In the Linux kernel, the following vulnerability has been resolved:
mm: prevent derefencing NULL ptr in pfnsectionvalid()
Commit 5ec8e8ea8b77 ("mm/sparsemem: fix race in accessing memorysection->usage") changed pfnsectionvalid() to add a READONCE() call around "ms->usage" to fix a race with sectiondeactivate() where ms->usage can be cleared. The READONCE() call, by itself, is not enough to prevent NULL pointer dereference. We need to check its value before dereferencing it.
{ "vanir_signatures": [ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@adccdf702b4ea913ded5ff512239e382d7473b63", "signature_type": "Line", "target": { "file": "include/linux/mmzone.h" }, "id": "CVE-2024-41055-3281e6ae", "digest": { "threshold": 0.9, "line_hashes": [ "50442206888464583132103214044809945203", "92967634484213677158979058069936954315", "52340502610076317876856258792455477356", "154353994689394877063370607297570387724", "41692656203134195475055109518615781303" ] }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@82f0b6f041fad768c28b4ad05a683065412c226e", "signature_type": "Line", "target": { "file": "include/linux/mmzone.h" }, "id": "CVE-2024-41055-396a6e06", "digest": { "threshold": 0.9, "line_hashes": [ "50442206888464583132103214044809945203", "92967634484213677158979058069936954315", "52340502610076317876856258792455477356", "154353994689394877063370607297570387724", "41692656203134195475055109518615781303" ] }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0100aeb8a12d51950418e685f879cc80cb8e5982", "signature_type": "Function", "target": { "file": "include/linux/mmzone.h", "function": "pfn_section_valid" }, "id": "CVE-2024-41055-3b999c60", "digest": { "function_hash": "172239322426634657912926243802284039928", "length": 180.0 }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc17f2377818dca643a74499c3f5333500c90503", "signature_type": "Line", "target": { "file": "include/linux/mmzone.h" }, "id": "CVE-2024-41055-4170883a", "digest": { "threshold": 0.9, "line_hashes": [ "50442206888464583132103214044809945203", "92967634484213677158979058069936954315", "52340502610076317876856258792455477356", "154353994689394877063370607297570387724", "41692656203134195475055109518615781303" ] }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bc17f2377818dca643a74499c3f5333500c90503", "signature_type": "Function", "target": { "file": "include/linux/mmzone.h", "function": "pfn_section_valid" }, "id": "CVE-2024-41055-5dfbe798", "digest": { "function_hash": "172239322426634657912926243802284039928", "length": 180.0 }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@adccdf702b4ea913ded5ff512239e382d7473b63", "signature_type": "Function", "target": { "file": "include/linux/mmzone.h", "function": "pfn_section_valid" }, "id": "CVE-2024-41055-5e0e3640", "digest": { "function_hash": "172239322426634657912926243802284039928", "length": 180.0 }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@797323d1cf92d09b7a017cfec576d9babf99cde7", "signature_type": "Line", "target": { "file": "include/linux/mmzone.h" }, "id": "CVE-2024-41055-946175d9", "digest": { "threshold": 0.9, "line_hashes": [ "50442206888464583132103214044809945203", "92967634484213677158979058069936954315", "52340502610076317876856258792455477356", "154353994689394877063370607297570387724", "41692656203134195475055109518615781303" ] }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@941e816185661bf2b44b488565d09444ae316509", "signature_type": "Line", "target": { "file": "include/linux/mmzone.h" }, "id": "CVE-2024-41055-b860c549", "digest": { "threshold": 0.9, "line_hashes": [ "50442206888464583132103214044809945203", "92967634484213677158979058069936954315", "52340502610076317876856258792455477356", "154353994689394877063370607297570387724", "41692656203134195475055109518615781303" ] }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@82f0b6f041fad768c28b4ad05a683065412c226e", "signature_type": "Function", "target": { "file": "include/linux/mmzone.h", "function": "pfn_section_valid" }, "id": "CVE-2024-41055-c01db577", "digest": { "function_hash": "172239322426634657912926243802284039928", "length": 180.0 }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@941e816185661bf2b44b488565d09444ae316509", "signature_type": "Function", "target": { "file": "include/linux/mmzone.h", "function": "pfn_section_valid" }, "id": "CVE-2024-41055-d1065f79", "digest": { "function_hash": "172239322426634657912926243802284039928", "length": 180.0 }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@797323d1cf92d09b7a017cfec576d9babf99cde7", "signature_type": "Function", "target": { "file": "include/linux/mmzone.h", "function": "pfn_section_valid" }, "id": "CVE-2024-41055-e48ff6f9", "digest": { "function_hash": "172239322426634657912926243802284039928", "length": 180.0 }, "deprecated": false, "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0100aeb8a12d51950418e685f879cc80cb8e5982", "signature_type": "Line", "target": { "file": "include/linux/mmzone.h" }, "id": "CVE-2024-41055-eebec79d", "digest": { "threshold": 0.9, "line_hashes": [ "50442206888464583132103214044809945203", "92967634484213677158979058069936954315", "52340502610076317876856258792455477356", "154353994689394877063370607297570387724", "41692656203134195475055109518615781303" ] }, "deprecated": false, "signature_version": "v1" } ] }