cve/2024/CVE-2024-49957.md
2025-09-29 21:09:30 +02:00

20 lines
1.3 KiB
Markdown

### [CVE-2024-49957](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49957)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.6.32%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=f6f50e28f0cb8d7bcdfaacc83129f005dede11b1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
In the Linux kernel, the following vulnerability has been resolved:ocfs2: fix null-ptr-deref when journal load failed.During the mounting process, if journal_reset() fails because of too shortjournal, then lead to jbd2_journal_load() fails with NULL j_sb_buffer. Subsequently, ocfs2_journal_shutdown() callsjbd2_journal_flush()->jbd2_cleanup_journal_tail()->__jbd2_update_log_tail()->jbd2_journal_update_sb_log_tail()->lock_buffer(journal->j_sb_buffer), resulting in a null-pointerdereference error.To resolve this issue, we should check the JBD2_LOADED flag to ensure thejournal was properly loaded. Additionally, use journal instead ofosb->journal directly to simplify the code.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/w4zu/Debian_security