5.5
MEDIUM
CVE-2024-48881
Linux Kernel - Bcache Null Pointer Dereference
Description

In the Linux kernel, the following vulnerability has been resolved: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again Commit 028ddcac477b ("bcache: Remove unnecessary NULL point check in node allocations") leads a NULL pointer deference in cache_set_flush(). 1721 if (!IS_ERR_OR_NULL(c->root)) 1722 list_add(&c->root->list, &c->btree_cache); >From the above code in cache_set_flush(), if previous registration code fails before allocating c->root, it is possible c->root is NULL as what it is initialized. __bch_btree_node_alloc() never returns NULL but c->root is possible to be NULL at above line 1721. This patch replaces IS_ERR() by IS_ERR_OR_NULL() to fix this.

INFO

Published Date :

Jan. 11, 2025, 1:15 p.m.

Last Modified :

Jan. 31, 2025, 3:54 p.m.

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Remotely Exploitable :

No

Impact Score :

3.6

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2024-48881 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-48881 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2024-48881 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 31, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Added CWE NIST CWE-476
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.19.291 up to (excluding) 4.20 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.4.251 up to (excluding) 5.4.287 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.10.188 up to (excluding) 5.10.231 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.15.121 up to (excluding) 5.15.174 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.1.39 up to (excluding) 6.1.120 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.4.4 up to (excluding) 6.6.66 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.12.5 *cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
    Changed Reference Type https://git.kernel.org/stable/c/336e30f32ae7c043fde0f6fa21586ff30bea9fe2 No Types Assigned https://git.kernel.org/stable/c/336e30f32ae7c043fde0f6fa21586ff30bea9fe2 Patch
    Changed Reference Type https://git.kernel.org/stable/c/4379c5828492a4c2a651c8f826a01453bd2b80b0 No Types Assigned https://git.kernel.org/stable/c/4379c5828492a4c2a651c8f826a01453bd2b80b0 Patch
    Changed Reference Type https://git.kernel.org/stable/c/5202391970ffbf81975251b3526b890ba027b715 No Types Assigned https://git.kernel.org/stable/c/5202391970ffbf81975251b3526b890ba027b715 Patch
    Changed Reference Type https://git.kernel.org/stable/c/5e0e913624bcd24f3de414475018d3023f060ee1 No Types Assigned https://git.kernel.org/stable/c/5e0e913624bcd24f3de414475018d3023f060ee1 Patch
    Changed Reference Type https://git.kernel.org/stable/c/b2e382ae12a63560fca35050498e19e760adf8c0 No Types Assigned https://git.kernel.org/stable/c/b2e382ae12a63560fca35050498e19e760adf8c0 Patch
    Changed Reference Type https://git.kernel.org/stable/c/cc05aa2c0117e20fa25a3c0d915f98b8f2e78667 No Types Assigned https://git.kernel.org/stable/c/cc05aa2c0117e20fa25a3c0d915f98b8f2e78667 Patch
    Changed Reference Type https://git.kernel.org/stable/c/fb5fee35bdd18316a84b5f30881a24e1415e1464 No Types Assigned https://git.kernel.org/stable/c/fb5fee35bdd18316a84b5f30881a24e1415e1464 Patch
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jan. 11, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again Commit 028ddcac477b ("bcache: Remove unnecessary NULL point check in node allocations") leads a NULL pointer deference in cache_set_flush(). 1721 if (!IS_ERR_OR_NULL(c->root)) 1722 list_add(&c->root->list, &c->btree_cache); >From the above code in cache_set_flush(), if previous registration code fails before allocating c->root, it is possible c->root is NULL as what it is initialized. __bch_btree_node_alloc() never returns NULL but c->root is possible to be NULL at above line 1721. This patch replaces IS_ERR() by IS_ERR_OR_NULL() to fix this.
    Added Reference https://git.kernel.org/stable/c/336e30f32ae7c043fde0f6fa21586ff30bea9fe2
    Added Reference https://git.kernel.org/stable/c/4379c5828492a4c2a651c8f826a01453bd2b80b0
    Added Reference https://git.kernel.org/stable/c/5202391970ffbf81975251b3526b890ba027b715
    Added Reference https://git.kernel.org/stable/c/5e0e913624bcd24f3de414475018d3023f060ee1
    Added Reference https://git.kernel.org/stable/c/b2e382ae12a63560fca35050498e19e760adf8c0
    Added Reference https://git.kernel.org/stable/c/cc05aa2c0117e20fa25a3c0d915f98b8f2e78667
    Added Reference https://git.kernel.org/stable/c/fb5fee35bdd18316a84b5f30881a24e1415e1464
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-48881 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-48881 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Apr. 26, 2025 2:26