CVE-2024-44939
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
26/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
jfs: fix null ptr deref in dtInsertEntry<br />
<br />
[syzbot reported]<br />
general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI<br />
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]<br />
CPU: 0 PID: 5061 Comm: syz-executor404 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0<br />
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024<br />
RIP: 0010:dtInsertEntry+0xd0c/0x1780 fs/jfs/jfs_dtree.c:3713<br />
...<br />
[Analyze]<br />
In dtInsertEntry(), when the pointer h has the same value as p, after writing<br />
name in UniStrncpy_to_le(), p->header.flag will be cleared. This will cause the<br />
previously true judgment "p->header.flag & BT-LEAF" to change to no after writing<br />
the name operation, this leads to entering an incorrect branch and accessing the<br />
uninitialized object ih when judging this condition for the second time.<br />
<br />
[Fix]<br />
After got the page, check freelist first, if freelist == 0 then exit dtInsert()<br />
and return -EINVAL.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.47 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/53023ab11836ac56fd75f7a71ec1356e50920fa9
- https://git.kernel.org/stable/c/6ea10dbb1e6c58384136e9adfd75f81951e423f6
- https://git.kernel.org/stable/c/9c2ac38530d1a3ee558834dfa16c85a40fd0e702
- https://git.kernel.org/stable/c/ce6dede912f064a855acf6f04a04cbb2c25b8c8c
- https://git.kernel.org/stable/c/f98bf80b20f4a930589cda48a35f751a64fe0dc2
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



