First published: Sat Jan 11 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again Commit 028ddcac477b ("bcache: Remove unnecessary NULL point check in node allocations") leads a NULL pointer deference in cache_set_flush(). 1721 if (!IS_ERR_OR_NULL(c->root)) 1722 list_add(&c->root->list, &c->btree_cache); >From the above code in cache_set_flush(), if previous registration code fails before allocating c->root, it is possible c->root is NULL as what it is initialized. __bch_btree_node_alloc() never returns NULL but c->root is possible to be NULL at above line 1721. This patch replaces IS_ERR() by IS_ERR_OR_NULL() to fix this.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | >=4.19.291<4.20 | |
Linux Kernel | >=5.4.251<5.4.287 | |
Linux Kernel | >=5.10.188<5.10.231 | |
Linux Kernel | >=5.15.121<5.15.174 | |
Linux Kernel | >=6.1.39<6.1.120 | |
Linux Kernel | >=6.4.4<6.6.66 | |
Linux Kernel | >=6.7<6.12.5 | |
Linux Kernel | =6.13-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48881 has a medium severity rating due to potential null pointer dereference issues.
CVE-2024-48881 affects multiple versions of the Linux kernel, specifically 4.19.291 to 4.20, 5.4.251 to 5.4.287, 5.10.188 to 5.10.231, 5.15.121 to 5.15.174, 6.1.39 to 6.1.120, 6.4.4 to 6.6.66, and 6.7 to 6.12.5.
To fix CVE-2024-48881, update to the latest patched version of the Linux kernel that addresses this vulnerability.
CVE-2024-48881 could potentially be exploited to cause a denial-of-service through null pointer dereference.
The impact of CVE-2024-48881 may lead to system instability and potential crashes, affecting overall performance.