CVE-2024-49877

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate When doing cleanup, if flags without OCFS2_BH_READAHEAD, it may trigger NULL pointer dereference in the following ocfs2_set_buffer_uptodate() if bh is NULL.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4.204:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.204:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.14.157:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.19.87:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/190d98bcd61117a78fe185222d162180f061a6ca -
  • () https://git.kernel.org/stable/c/e68c8323355e8cedfbe0bec7d5a39009f61640b6 -

24 Oct 2024, 19:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/01cb2e751cc61ade454c9bc1aaa2eac1f8197112 - () https://git.kernel.org/stable/c/01cb2e751cc61ade454c9bc1aaa2eac1f8197112 - Patch
References () https://git.kernel.org/stable/c/33b525cef4cff49e216e4133cc48452e11c0391e - () https://git.kernel.org/stable/c/33b525cef4cff49e216e4133cc48452e11c0391e - Patch
References () https://git.kernel.org/stable/c/46b1edf0536a5291a8ad2337f88c926214b209d9 - () https://git.kernel.org/stable/c/46b1edf0536a5291a8ad2337f88c926214b209d9 - Patch
References () https://git.kernel.org/stable/c/4846e72ab5a0726e49ad4188b9d9df091ae78c64 - () https://git.kernel.org/stable/c/4846e72ab5a0726e49ad4188b9d9df091ae78c64 - Patch
References () https://git.kernel.org/stable/c/61b84013e560382cbe7dd56758be3154d43a3988 - () https://git.kernel.org/stable/c/61b84013e560382cbe7dd56758be3154d43a3988 - Patch
References () https://git.kernel.org/stable/c/d52c5652e7dcb7a0648bbb8642cc3e617070ab49 - () https://git.kernel.org/stable/c/d52c5652e7dcb7a0648bbb8642cc3e617070ab49 - Patch
References () https://git.kernel.org/stable/c/df944dc46d06af65a75191183d52be017e6b9dbe - () https://git.kernel.org/stable/c/df944dc46d06af65a75191183d52be017e6b9dbe - Patch
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.204:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.4.204:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.19.87:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.14.157:*:*:*:*:*:*:*

23 Oct 2024, 15:13

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: se corrige una posible desreferencia de puntero nulo en ocfs2_set_buffer_uptodate. Al realizar una limpieza, si hay indicadores sin OCFS2_BH_READAHEAD, puede provocar una desreferencia de puntero NULL en el siguiente ocfs2_set_buffer_uptodate() si bh es NULL.

21 Oct 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 18:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-49877

Mitre link : CVE-2024-49877

CVE.ORG link : CVE-2024-49877


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference