CVE-2024-53131

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53131
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53131.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53131
Downstream
Related
Published
2024-12-04T14:20:37.455Z
Modified
2025-11-28T02:34:10.963774Z
Summary
nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
Details

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix null-ptr-deref in blocktouchbuffer tracepoint

Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints".

This series fixes null pointer dereference bugs that occur when using nilfs2 and two block-related tracepoints.

This patch (of 2):

It has been reported that when using "block:blocktouchbuffer" tracepoint, touchbuffer() called from _nilfsgetfolio_block() causes a NULL pointer dereference, or a general protection fault when KASAN is enabled.

This happens because since the tracepoint was added in touchbuffer(), it references the devt member bh->bbdev->bddev regardless of whether the buffer head has a pointer to a blockdevice structure. In the current implementation, the blockdevice structure is set after the function returns to the caller.

Here, touchbuffer() is used to mark the folio/page that owns the buffer head as accessed, but the common search helper for folio/page used by the caller function was optimized to mark the folio/page as accessed when it was reimplemented a long time ago, eliminating the need to call touchbuffer() here in the first place.

So this solves the issue by eliminating the touch_buffer() call itself.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53131.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5305cb830834549b9203ad4d009ad5483c5e293f
Fixed
085556bf8c70e2629e02e79268dac3016a08b8bf
Fixed
6438f3f42cda825f6f59b4e45ac3a1da28a6f2c9
Fixed
b017697a517f8779ada4e8ce1c2c75dbf60a2636
Fixed
19c71cdd77973f99a9adc3190130bc3aa7ae5423
Fixed
3b2a4fd9bbee77afdd3ed5a05a0c02b6cde8d3b9
Fixed
59b49ca67cca7b007a5afd3de0283c8008157665
Fixed
77e47f89d32c2d72eb33d0becbce7abe14d061f4
Fixed
cd45e963e44b0f10d90b9e6c0e8b4f47f3c92471

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.9.0
Fixed
4.19.325
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.287
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.231
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.174
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.119
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.63
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.11.10