CVE-2024-49957

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix null-ptr-deref when journal load failed. During the mounting process, if journal_reset() fails because of too short journal, then lead to jbd2_journal_load() fails with NULL j_sb_buffer. Subsequently, ocfs2_journal_shutdown() calls jbd2_journal_flush()->jbd2_cleanup_journal_tail()-> __jbd2_update_log_tail()->jbd2_journal_update_sb_log_tail() ->lock_buffer(journal->j_sb_buffer), resulting in a null-pointer dereference error. To resolve this issue, we should check the JBD2_LOADED flag to ensure the journal was properly loaded. Additionally, use journal instead of osb->journal directly to simplify the code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/703b2c7e0798d263154dc8593dc2345f75dc077f -
  • () https://git.kernel.org/stable/c/fd89d92c1140cee8f59de336cb37fa65e359c123 -

28 Oct 2024, 16:12

Type Values Removed Values Added
CWE CWE-476
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/387bf565cc03e2e8c720b8b4798efea4aacb6962 - () https://git.kernel.org/stable/c/387bf565cc03e2e8c720b8b4798efea4aacb6962 - Patch
References () https://git.kernel.org/stable/c/5784d9fcfd43bd853654bb80c87ef293b9e8e80a - () https://git.kernel.org/stable/c/5784d9fcfd43bd853654bb80c87ef293b9e8e80a - Patch
References () https://git.kernel.org/stable/c/82dfdd1e31e774578f76ce6dc90c834f96403a0f - () https://git.kernel.org/stable/c/82dfdd1e31e774578f76ce6dc90c834f96403a0f - Patch
References () https://git.kernel.org/stable/c/86a89e75e9e4dfa768b97db466ad6bedf2e7ea5b - () https://git.kernel.org/stable/c/86a89e75e9e4dfa768b97db466ad6bedf2e7ea5b - Patch
References () https://git.kernel.org/stable/c/bf605ae98dab5c15c5b631d4d7f88898cb41b649 - () https://git.kernel.org/stable/c/bf605ae98dab5c15c5b631d4d7f88898cb41b649 - Patch
References () https://git.kernel.org/stable/c/f60e94a83db799bde625ac8671a5b4a6354e7120 - () https://git.kernel.org/stable/c/f60e94a83db799bde625ac8671a5b4a6354e7120 - Patch
References () https://git.kernel.org/stable/c/ff55291fb36779819211b596da703389135f5b05 - () https://git.kernel.org/stable/c/ff55291fb36779819211b596da703389135f5b05 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

23 Oct 2024, 15:13

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: se corrige el error null-ptr-deref cuando falla la carga del diario. Durante el proceso de montaje, si journal_reset() falla debido a que el diario es demasiado corto, entonces provoca que jbd2_journal_load() falle con j_sb_buffer NULL. Posteriormente, ocfs2_journal_shutdown() llama a jbd2_journal_flush()->jbd2_cleanup_journal_tail()-> __jbd2_update_log_tail()->jbd2_journal_update_sb_log_tail() ->lock_buffer(journal->j_sb_buffer), lo que da como resultado un error de desreferencia de puntero nulo. Para resolver este problema, debemos verificar el indicador JBD2_LOADED para asegurarnos de que el diario se cargó correctamente. Además, use journal en lugar de osb->journal directamente para simplificar el código.

21 Oct 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 18:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-49957

Mitre link : CVE-2024-49957

CVE.ORG link : CVE-2024-49957


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference