In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix error checks in dasd_copy_pair_store() dasd_add_busid() can return an error via ERR_PTR() if an allocation fails. However, two callsites in dasd_copy_pair_store() do not check the result, potentially resulting in a NULL pointer dereference. Fix this by checking the result with IS_ERR() and returning the error up the stack.
History

Mon, 16 Sep 2024 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
Metrics threat_severity

Moderate

threat_severity

Low


Wed, 11 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Aug 2024 19:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Sat, 17 Aug 2024 09:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix error checks in dasd_copy_pair_store() dasd_add_busid() can return an error via ERR_PTR() if an allocation fails. However, two callsites in dasd_copy_pair_store() do not check the result, potentially resulting in a NULL pointer dereference. Fix this by checking the result with IS_ERR() and returning the error up the stack.
Title s390/dasd: fix error checks in dasd_copy_pair_store()
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-08-17T09:09:32.695Z

Updated: 2024-09-15T17:53:32.114Z

Reserved: 2024-07-30T07:40:12.279Z

Link: CVE-2024-42320

cve-icon Vulnrichment

Updated: 2024-09-11T12:42:23.344Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-17T09:15:11.833

Modified: 2024-08-19T12:59:59.177

Link: CVE-2024-42320

cve-icon Redhat

Severity : Low

Publid Date: 2024-08-17T00:00:00Z

Links: CVE-2024-42320 - Bugzilla