CVE-2024-53131

Source
https://cve.org/CVERecord?id=CVE-2024-53131
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53131.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53131
Downstream
Related
Published
2024-12-04T14:20:37.455Z
Modified
2026-03-20T12:40:46.027272Z
Summary
nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
Details

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix null-ptr-deref in blocktouchbuffer tracepoint

Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints".

This series fixes null pointer dereference bugs that occur when using nilfs2 and two block-related tracepoints.

This patch (of 2):

It has been reported that when using "block:blocktouchbuffer" tracepoint, touch_buffer() called from _nilfsgetfolioblock() causes a NULL pointer dereference, or a general protection fault when KASAN is enabled.

This happens because since the tracepoint was added in touchbuffer(), it references the devt member bh->bbdev->bddev regardless of whether the buffer head has a pointer to a blockdevice structure. In the current implementation, the blockdevice structure is set after the function returns to the caller.

Here, touchbuffer() is used to mark the folio/page that owns the buffer head as accessed, but the common search helper for folio/page used by the caller function was optimized to mark the folio/page as accessed when it was reimplemented a long time ago, eliminating the need to call touchbuffer() here in the first place.

So this solves the issue by eliminating the touch_buffer() call itself.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53131.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5305cb830834549b9203ad4d009ad5483c5e293f
Fixed
085556bf8c70e2629e02e79268dac3016a08b8bf
Fixed
6438f3f42cda825f6f59b4e45ac3a1da28a6f2c9
Fixed
b017697a517f8779ada4e8ce1c2c75dbf60a2636
Fixed
19c71cdd77973f99a9adc3190130bc3aa7ae5423
Fixed
3b2a4fd9bbee77afdd3ed5a05a0c02b6cde8d3b9
Fixed
59b49ca67cca7b007a5afd3de0283c8008157665
Fixed
77e47f89d32c2d72eb33d0becbce7abe14d061f4
Fixed
cd45e963e44b0f10d90b9e6c0e8b4f47f3c92471

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53131.json"