First published: Wed Dec 04 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints". This series fixes null pointer dereference bugs that occur when using nilfs2 and two block-related tracepoints. This patch (of 2): It has been reported that when using "block:block_touch_buffer" tracepoint, touch_buffer() called from __nilfs_get_folio_block() causes a NULL pointer dereference, or a general protection fault when KASAN is enabled. This happens because since the tracepoint was added in touch_buffer(), it references the dev_t member bh->b_bdev->bd_dev regardless of whether the buffer head has a pointer to a block_device structure. In the current implementation, the block_device structure is set after the function returns to the caller. Here, touch_buffer() is used to mark the folio/page that owns the buffer head as accessed, but the common search helper for folio/page used by the caller function was optimized to mark the folio/page as accessed when it was reimplemented a long time ago, eliminating the need to call touch_buffer() here in the first place. So this solves the issue by eliminating the touch_buffer() call itself.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=3.9<6.1.119 | |
Linux kernel | >=6.6.0<6.6.63 | |
Linux kernel | >=6.11.0<6.11.10 | |
Linux Kernel | >=3.9<6.1.119 | |
Linux Kernel | >=6.6.0<6.6.63 | |
Linux Kernel | >=6.11.0<6.11.10 | |
debian/linux | <=5.10.223-1 | 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53131 has a severity rating that indicates it can lead to null pointer dereference vulnerabilities in the Linux kernel.
To fix CVE-2024-53131, you should update your Linux kernel to a version that includes the patches, such as 6.1.123-1 or newer.
CVE-2024-53131 affects versions from 3.9 to 6.1.119, 6.6.0 to 6.6.63, and 6.11.0 to 6.11.10.
CVE-2024-53131 impacts the nilfs2 file system within the Linux kernel.
Yes, CVE-2024-53131 can result in null pointer dereference which may lead to system crashes or instability.