CVE-2024-26871
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
17/04/2024
Last modified:
14/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: fix NULL pointer dereference in f2fs_submit_page_write()<br />
<br />
BUG: kernel NULL pointer dereference, address: 0000000000000014<br />
RIP: 0010:f2fs_submit_page_write+0x6cf/0x780 [f2fs]<br />
Call Trace:<br />
<br />
? show_regs+0x6e/0x80<br />
? __die+0x29/0x70<br />
? page_fault_oops+0x154/0x4a0<br />
? prb_read_valid+0x20/0x30<br />
? __irq_work_queue_local+0x39/0xd0<br />
? irq_work_queue+0x36/0x70<br />
? do_user_addr_fault+0x314/0x6c0<br />
? exc_page_fault+0x7d/0x190<br />
? asm_exc_page_fault+0x2b/0x30<br />
? f2fs_submit_page_write+0x6cf/0x780 [f2fs]<br />
? f2fs_submit_page_write+0x736/0x780 [f2fs]<br />
do_write_page+0x50/0x170 [f2fs]<br />
f2fs_outplace_write_data+0x61/0xb0 [f2fs]<br />
f2fs_do_write_data_page+0x3f8/0x660 [f2fs]<br />
f2fs_write_single_data_page+0x5bb/0x7a0 [f2fs]<br />
f2fs_write_cache_pages+0x3da/0xbe0 [f2fs]<br />
...<br />
It is possible that other threads have added this fio to io->bio<br />
and submitted the io->bio before entering f2fs_submit_page_write().<br />
At this point io->bio = NULL.<br />
If is_end_zone_blkaddr(sbi, fio->new_blkaddr) of this fio is true,<br />
then an NULL pointer dereference error occurs at bio_get(io->bio).<br />
The original code for determining zone end was after "out:",<br />
which would have missed some fio who is zone end. I&#39;ve moved<br />
this code before "skip:" to make sure it&#39;s done for each fio.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.5 (including) | 6.6.23 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.8.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/4c122a32582b67bdd44ca8d25f894ee2dc54f566
- https://git.kernel.org/stable/c/6d102382a11d5e6035f6c98f6e508a38541f7af3
- https://git.kernel.org/stable/c/8e2ea8b04cb8d976110c4568509e67d6a39b2889
- https://git.kernel.org/stable/c/c2034ef6192a65a986a45c2aa2ed05824fdc0e9f
- https://git.kernel.org/stable/c/4c122a32582b67bdd44ca8d25f894ee2dc54f566
- https://git.kernel.org/stable/c/6d102382a11d5e6035f6c98f6e508a38541f7af3
- https://git.kernel.org/stable/c/8e2ea8b04cb8d976110c4568509e67d6a39b2889
- https://git.kernel.org/stable/c/c2034ef6192a65a986a45c2aa2ed05824fdc0e9f



