First published: Fri Dec 27 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: cachefiles: Fix NULL pointer dereference in object->file At present, the object->file has the NULL pointer dereference problem in ondemand-mode. The root cause is that the allocated fd and object->file lifetime are inconsistent, and the user-space invocation to anon_fd uses object->file. Following is the process that triggers the issue: [write fd] [umount] cachefiles_ondemand_fd_write_iter fscache_cookie_state_machine cachefiles_withdraw_cookie if (!file) return -ENOBUFS cachefiles_clean_up_object cachefiles_unmark_inode_in_use fput(object->file) object->file = NULL // file NULL pointer dereference! __cachefiles_write(..., file, ...) Fix this issue by add an additional reference count to the object->file before write/llseek, and decrement after it finished.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.19<6.11.11 | |
Linux Kernel | >=6.12<6.12.2 | |
debian/linux | <=6.1.123-1<=6.1.128-1 | 5.10.223-1 5.10.226-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56549 has a high severity due to the potential for a NULL pointer dereference in the Linux kernel.
To fix CVE-2024-56549, upgrade to the appropriate patched versions of the Linux kernel mentioned in security advisories.
CVE-2024-56549 affects Linux kernel versions from 5.19 up to 6.11.11 and also versions from 6.12 to 6.12.2.
Exploitation of CVE-2024-56549 could lead to system crashes or instability due to the NULL pointer dereference.
CVE-2024-56549 is considered a local vulnerability as it requires local access to exploit the NULL pointer dereference.