CVE-2024-42079
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
29/07/2024
Last modified:
12/02/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
gfs2: Fix NULL pointer dereference in gfs2_log_flush<br />
<br />
In gfs2_jindex_free(), set sdp->sd_jdesc to NULL under the log flush<br />
lock to provide exclusion against gfs2_log_flush().<br />
<br />
In gfs2_log_flush(), check if sdp->sd_jdesc is non-NULL before<br />
dereferencing it. Otherwise, we could run into a NULL pointer<br />
dereference when outstanding glock work races with an unmount<br />
(glock_work_func -> run_queue -> do_xmote -> inode_go_sync -><br />
gfs2_log_flush).
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.37 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.8 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce
- https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828
- https://git.kernel.org/stable/c/5f6a84cfb33b34610623857bd93919dcb661e29b
- https://git.kernel.org/stable/c/c3c5cfa3170c0940bc66a142859caac07d19b9d6
- https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef
- https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce
- https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828
- https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef



