Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-53130— nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint

EPSS 0.01% · P3

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinux5305cb830834549b9203ad4d009ad5483c5e293f< 7af3309c7a2ef26831a67125b11c34a7e01c1b2aaffected
5305cb830834549b9203ad4d009ad5483c5e293f< 0ce59fb1c73fdd5b6028226aeb46259a0cdc0957affected
5305cb830834549b9203ad4d009ad5483c5e293f< 0a5014ad37c77ac6a2c525137c00a0e1724f6020affected
5305cb830834549b9203ad4d009ad5483c5e293f< d904e4d845aafbcfd8a40c1df7d999f02f062be8affected
5305cb830834549b9203ad4d009ad5483c5e293f< 86b19031dbc79abc378dfae357f6ea33ebeb0c95affected
5305cb830834549b9203ad4d009ad5483c5e293f< b0e4765740040c44039282057ecacd7435d1d2baaffected
5305cb830834549b9203ad4d009ad5483c5e293f< ffc440a76a0f476a7e6ea838ec0dc8e9979944d1affected
5305cb830834549b9203ad4d009ad5483c5e293f< 2026559a6c4ce34db117d2db8f710fe2a9420d5aaffected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-53130

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint When using the "block:block_dirty_buffer" tracepoint, mark_buffer_dirty() may cause a NULL pointer dereference, or a general protection fault when KASAN is enabled. This happens because, since the tracepoint was added in mark_buffer_dirty(), it references the dev_t member bh->b_bdev->bd_dev regardless of whether the buffer head has a pointer to a block_device structure. In the current implementation, nilfs_grab_buffer(), which grabs a buffer to read (or create) a block of metadata, including b-tree node blocks, does not set the block device, but instead does so only if the buffer is not in the "uptodate" state for each of its caller block reading functions. However, if the uptodate flag is set on a folio/page, and the buffer heads are detached from it by try_to_free_buffers(), and new buffer heads are then attached by create_empty_buffers(), the uptodate flag may be restored to each buffer without the block device being set to bh->b_bdev, and mark_buffer_dirty() may be called later in that state, resulting in the bug mentioned above. Fix this issue by making nilfs_grab_buffer() always set the block device of the super block structure to the buffer head, regardless of the state of the buffer's uptodate flag.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于nilfs2文件系统中在使用block_dirty_buffer tracepoint时可能导致的空指针解引用问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 5305cb830834549b9203ad4d009ad5483c5e293f ~ 7af3309c7a2ef26831a67125b11c34a7e01c1b2a -
LinuxLinux 3.9 -

II. Public POCs for CVE-2024-53130

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-53130

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-12-04 · 16 CVEs total

CVE-2024-53125bpf: sync_linked_regs() must preserve subreg_def
CVE-2024-53126vdpa: solidrun: Fix UB bug with devres
CVE-2024-53127Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"
CVE-2024-53128sched/task_stack: fix object_is_on_stack() for KASAN tagged pointers
CVE-2024-53129drm/rockchip: vop: Fix a dereferenced before check warning
CVE-2024-53131nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
CVE-2024-53132drm/xe/oa: Fix "Missing outer runtime PM protection" warning
CVE-2024-53133drm/amd/display: Handle dml allocation failure to avoid crash
CVE-2024-53134pmdomain: imx93-blk-ctrl: correct remove path
CVE-2024-53135KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
CVE-2024-53136mm: revert "mm: shmem: fix data-race in shmem_getattr()"
CVE-2024-53138net/mlx5e: kTLS, Fix incorrect page refcounting
CVE-2024-53137ARM: fix cacheflush with PAN
CVE-2024-53139sctp: fix possible UAF in sctp_v6_available()
CVE-2024-53140netlink: terminate outstanding dump on socket close

IV. Related Vulnerabilities

V. Comments for CVE-2024-53130

No comments yet


Leave a comment