CVE-2024-48881
Linux Kernel - Bcache Null Pointer Dereference
Description
In the Linux kernel, the following vulnerability has been resolved: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again Commit 028ddcac477b ("bcache: Remove unnecessary NULL point check in node allocations") leads a NULL pointer deference in cache_set_flush(). 1721 if (!IS_ERR_OR_NULL(c->root)) 1722 list_add(&c->root->list, &c->btree_cache); >From the above code in cache_set_flush(), if previous registration code fails before allocating c->root, it is possible c->root is NULL as what it is initialized. __bch_btree_node_alloc() never returns NULL but c->root is possible to be NULL at above line 1721. This patch replaces IS_ERR() by IS_ERR_OR_NULL() to fix this.
INFO
Published Date :
Jan. 11, 2025, 1:15 p.m.
Last Modified :
Jan. 31, 2025, 3:54 p.m.
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Remotely Exploitable :
No
Impact Score :
3.6
Exploitability Score :
1.8
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-48881
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-48881
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-48881
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Jan. 31, 2025
Action Type Old Value New Value Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE NIST CWE-476 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.19.291 up to (excluding) 4.20 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.4.251 up to (excluding) 5.4.287 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.10.188 up to (excluding) 5.10.231 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.15.121 up to (excluding) 5.15.174 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.1.39 up to (excluding) 6.1.120 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.4.4 up to (excluding) 6.6.66 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.12.5 *cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* Changed Reference Type https://git.kernel.org/stable/c/336e30f32ae7c043fde0f6fa21586ff30bea9fe2 No Types Assigned https://git.kernel.org/stable/c/336e30f32ae7c043fde0f6fa21586ff30bea9fe2 Patch Changed Reference Type https://git.kernel.org/stable/c/4379c5828492a4c2a651c8f826a01453bd2b80b0 No Types Assigned https://git.kernel.org/stable/c/4379c5828492a4c2a651c8f826a01453bd2b80b0 Patch Changed Reference Type https://git.kernel.org/stable/c/5202391970ffbf81975251b3526b890ba027b715 No Types Assigned https://git.kernel.org/stable/c/5202391970ffbf81975251b3526b890ba027b715 Patch Changed Reference Type https://git.kernel.org/stable/c/5e0e913624bcd24f3de414475018d3023f060ee1 No Types Assigned https://git.kernel.org/stable/c/5e0e913624bcd24f3de414475018d3023f060ee1 Patch Changed Reference Type https://git.kernel.org/stable/c/b2e382ae12a63560fca35050498e19e760adf8c0 No Types Assigned https://git.kernel.org/stable/c/b2e382ae12a63560fca35050498e19e760adf8c0 Patch Changed Reference Type https://git.kernel.org/stable/c/cc05aa2c0117e20fa25a3c0d915f98b8f2e78667 No Types Assigned https://git.kernel.org/stable/c/cc05aa2c0117e20fa25a3c0d915f98b8f2e78667 Patch Changed Reference Type https://git.kernel.org/stable/c/fb5fee35bdd18316a84b5f30881a24e1415e1464 No Types Assigned https://git.kernel.org/stable/c/fb5fee35bdd18316a84b5f30881a24e1415e1464 Patch -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jan. 11, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again Commit 028ddcac477b ("bcache: Remove unnecessary NULL point check in node allocations") leads a NULL pointer deference in cache_set_flush(). 1721 if (!IS_ERR_OR_NULL(c->root)) 1722 list_add(&c->root->list, &c->btree_cache); >From the above code in cache_set_flush(), if previous registration code fails before allocating c->root, it is possible c->root is NULL as what it is initialized. __bch_btree_node_alloc() never returns NULL but c->root is possible to be NULL at above line 1721. This patch replaces IS_ERR() by IS_ERR_OR_NULL() to fix this. Added Reference https://git.kernel.org/stable/c/336e30f32ae7c043fde0f6fa21586ff30bea9fe2 Added Reference https://git.kernel.org/stable/c/4379c5828492a4c2a651c8f826a01453bd2b80b0 Added Reference https://git.kernel.org/stable/c/5202391970ffbf81975251b3526b890ba027b715 Added Reference https://git.kernel.org/stable/c/5e0e913624bcd24f3de414475018d3023f060ee1 Added Reference https://git.kernel.org/stable/c/b2e382ae12a63560fca35050498e19e760adf8c0 Added Reference https://git.kernel.org/stable/c/cc05aa2c0117e20fa25a3c0d915f98b8f2e78667 Added Reference https://git.kernel.org/stable/c/fb5fee35bdd18316a84b5f30881a24e1415e1464
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-48881
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-48881
weaknesses.