First published: Fri Jul 12 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix NULL pointer dereference in ocfs2_abort_trigger() bdev->bd_super has been removed and commit 8887b94d9322 change the usage from bdev->bd_super to b_assoc_map->host->i_sb. Since ocfs2 hasn't set bh->b_assoc_map, it will trigger NULL pointer dereference when calling into ocfs2_abort_trigger(). Actually this was pointed out in history, see commit 74e364ad1b13. But I've made a mistake when reviewing commit 8887b94d9322 and then re-introduce this regression. Since we cannot revive bdev in buffer head, so fix this issue by initializing all types of ocfs2 triggers when fill super, and then get the specific ocfs2 trigger from ocfs2_caching_info when access journal. [joseph.qi@linux.alibaba.com: v2]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.6<6.6.36 | |
Linux Kernel | >=6.7<6.9.7 | |
Linux Kernel | =6.10-rc1 | |
Linux Kernel | =6.10-rc2 | |
Linux Kernel | =6.10-rc3 | |
Linux Kernel | =6.10-rc4 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40951 has been classified as a medium-severity vulnerability due to the potential for denial-of-service conditions.
To fix CVE-2024-40951, update to the recommended Linux kernel versions or patches provided by your distribution.
CVE-2024-40951 affects versions of the Linux kernel between 6.6 and 6.9.7, along with specific release candidates like 6.10-rc1 to 6.10-rc4.
CVE-2024-40951 specifically impacts the OCFS2 file system component of the Linux kernel.
As of now, there are no publicly available exploits for CVE-2024-40951, but it is advisable to patch systems to prevent potential attacks.