CVE-2024-42079

In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix NULL pointer dereference in gfs2_log_flush In gfs2_jindex_free(), set sdp->sd_jdesc to NULL under the log flush lock to provide exclusion against gfs2_log_flush(). In gfs2_log_flush(), check if sdp->sd_jdesc is non-NULL before dereferencing it. Otherwise, we could run into a NULL pointer dereference when outstanding glock work races with an unmount (glock_work_func -> run_queue -> do_xmote -> inode_go_sync -> gfs2_log_flush).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:33

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce - Patch () https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce - Patch
References () https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828 - Patch () https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828 - Patch
References () https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef - Patch () https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef - Patch

30 Jul 2024, 18:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gfs2: corrige la desreferencia del puntero NULL en gfs2_log_flush En gfs2_jindex_free(), establezca sdp->sd_jdesc en NULL bajo el bloqueo de descarga de registros para proporcionar exclusión contra gfs2_log_flush(). En gfs2_log_flush(), verifique si sdp->sd_jdesc no es NULL antes de desreferenciarlo. De lo contrario, podríamos encontrarnos con una desreferencia de puntero NULL cuando el trabajo de glock pendiente se ejecuta con un desmontaje (glock_work_func -> run_queue -> do_xmote -> inode_go_sync -> gfs2_log_flush).
References () https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce - () https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce - Patch
References () https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828 - () https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828 - Patch
References () https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef - () https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-476

29 Jul 2024, 16:21

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 16:15

Updated : 2024-11-21 09:33


NVD link : CVE-2024-42079

Mitre link : CVE-2024-42079

CVE.ORG link : CVE-2024-42079


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference