### [CVE-2024-49877](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49877) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=01f93d5e36753fc4d06ec67f05ce78c9c6f2dd56%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.20%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=65cbd1279f4b999d56a838344a30642db24cd215%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6c150df9c2e80b5cf86f5a0d98beb7390ad63bfc%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=97e1db17bc1ef4c2e1789bc9323c7be44fba53f8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=cf76c78595ca87548ca5e45c862ac9e0949c4687%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodateWhen doing cleanup, if flags without OCFS2_BH_READAHEAD, it may triggerNULL pointer dereference in the following ocfs2_set_buffer_uptodate() ifbh is NULL. ### POC #### Reference No PoCs from references. #### Github - https://github.com/w4zu/Debian_security