Executive Summary

Informations
Name CVE-2024-53131 First vendor Publication 2024-12-04
Vendor Cve Last vendor Modification 2024-12-14

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint

Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints".

This series fixes null pointer dereference bugs that occur when using nilfs2 and two block-related tracepoints.

This patch (of 2):

It has been reported that when using "block:block_touch_buffer" tracepoint, touch_buffer() called from __nilfs_get_folio_block() causes a NULL pointer dereference, or a general protection fault when KASAN is enabled.

This happens because since the tracepoint was added in touch_buffer(), it references the dev_t member bh->b_bdev->bd_dev regardless of whether the buffer head has a pointer to a block_device structure. In the current implementation, the block_device structure is set after the function returns to the caller.

Here, touch_buffer() is used to mark the folio/page that owns the buffer head as accessed, but the common search helper for folio/page used by the caller function was optimized to mark the folio/page as accessed when it was reimplemented a long time ago, eliminating the need to call touch_buffer() here in the first place.

So this solves the issue by eliminating the touch_buffer() call itself.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53131

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3682

Sources (Detail)

https://git.kernel.org/stable/c/085556bf8c70e2629e02e79268dac3016a08b8bf
https://git.kernel.org/stable/c/19c71cdd77973f99a9adc3190130bc3aa7ae5423
https://git.kernel.org/stable/c/3b2a4fd9bbee77afdd3ed5a05a0c02b6cde8d3b9
https://git.kernel.org/stable/c/59b49ca67cca7b007a5afd3de0283c8008157665
https://git.kernel.org/stable/c/6438f3f42cda825f6f59b4e45ac3a1da28a6f2c9
https://git.kernel.org/stable/c/77e47f89d32c2d72eb33d0becbce7abe14d061f4
https://git.kernel.org/stable/c/b017697a517f8779ada4e8ce1c2c75dbf60a2636
https://git.kernel.org/stable/c/cd45e963e44b0f10d90b9e6c0e8b4f47f3c92471
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Date Informations
2025-03-29 03:43:42
  • Multiple Updates
2025-03-28 13:47:10
  • Multiple Updates
2025-03-28 03:21:28
  • Multiple Updates
2025-03-19 03:16:30
  • Multiple Updates
2025-03-18 03:29:30
  • Multiple Updates
2025-03-14 03:16:40
  • Multiple Updates
2025-03-06 14:13:12
  • Multiple Updates
2025-02-22 03:26:44
  • Multiple Updates
2025-01-08 03:07:36
  • Multiple Updates
2025-01-07 03:07:10
  • Multiple Updates
2024-12-25 03:05:45
  • Multiple Updates
2024-12-15 00:20:31
  • Multiple Updates
2024-12-12 00:20:31
  • Multiple Updates
2024-12-11 17:20:28
  • Multiple Updates
2024-12-05 17:20:29
  • Multiple Updates
2024-12-04 21:20:29
  • First insertion