CVE-2024-53221
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
27/12/2024
Last modified:
17/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: fix null-ptr-deref in f2fs_submit_page_bio()<br />
<br />
There&#39;s issue as follows when concurrently installing the f2fs.ko<br />
module and mounting the f2fs file system:<br />
KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027]<br />
RIP: 0010:__bio_alloc+0x2fb/0x6c0 [f2fs]<br />
Call Trace:<br />
<br />
f2fs_submit_page_bio+0x126/0x8b0 [f2fs]<br />
__get_meta_page+0x1d4/0x920 [f2fs]<br />
get_checkpoint_version.constprop.0+0x2b/0x3c0 [f2fs]<br />
validate_checkpoint+0xac/0x290 [f2fs]<br />
f2fs_get_valid_checkpoint+0x207/0x950 [f2fs]<br />
f2fs_fill_super+0x1007/0x39b0 [f2fs]<br />
mount_bdev+0x183/0x250<br />
legacy_get_tree+0xf4/0x1e0<br />
vfs_get_tree+0x88/0x340<br />
do_new_mount+0x283/0x5e0<br />
path_mount+0x2b2/0x15b0<br />
__x64_sys_mount+0x1fe/0x270<br />
do_syscall_64+0x5f/0x170<br />
entry_SYSCALL_64_after_hwframe+0x76/0x7e<br />
<br />
Above issue happens as the biset of the f2fs file system is not<br />
initialized before register "f2fs_fs_type".<br />
To address above issue just register "f2fs_fs_type" at the last in<br />
init_f2fs_fs(). Ensure that all f2fs file system resources are<br />
initialized.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.6 (including) | 6.11.11 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page