CWE
476
Advisory Published
Updated

CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint

First published: Wed Dec 04 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints". This series fixes null pointer dereference bugs that occur when using nilfs2 and two block-related tracepoints. This patch (of 2): It has been reported that when using "block:block_touch_buffer" tracepoint, touch_buffer() called from __nilfs_get_folio_block() causes a NULL pointer dereference, or a general protection fault when KASAN is enabled. This happens because since the tracepoint was added in touch_buffer(), it references the dev_t member bh->b_bdev->bd_dev regardless of whether the buffer head has a pointer to a block_device structure. In the current implementation, the block_device structure is set after the function returns to the caller. Here, touch_buffer() is used to mark the folio/page that owns the buffer head as accessed, but the common search helper for folio/page used by the caller function was optimized to mark the folio/page as accessed when it was reimplemented a long time ago, eliminating the need to call touch_buffer() here in the first place. So this solves the issue by eliminating the touch_buffer() call itself.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Linux kernel>=3.9<6.1.119
Linux kernel>=6.6.0<6.6.63
Linux kernel>=6.11.0<6.11.10
Linux Kernel>=3.9<6.1.119
Linux Kernel>=6.6.0<6.6.63
Linux Kernel>=6.11.0<6.11.10
debian/linux<=5.10.223-1
5.10.234-1
6.1.129-1
6.1.128-1
6.12.20-1
6.12.21-1
debian/linux-6.1
6.1.129-1~deb11u1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-53131?

    CVE-2024-53131 has a severity rating that indicates it can lead to null pointer dereference vulnerabilities in the Linux kernel.

  • How do I fix CVE-2024-53131?

    To fix CVE-2024-53131, you should update your Linux kernel to a version that includes the patches, such as 6.1.123-1 or newer.

  • Which versions of the Linux kernel are affected by CVE-2024-53131?

    CVE-2024-53131 affects versions from 3.9 to 6.1.119, 6.6.0 to 6.6.63, and 6.11.0 to 6.11.10.

  • What component of Linux is impacted by CVE-2024-53131?

    CVE-2024-53131 impacts the nilfs2 file system within the Linux kernel.

  • Can CVE-2024-53131 cause system crashes?

    Yes, CVE-2024-53131 can result in null pointer dereference which may lead to system crashes or instability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203