๐Ÿ” CVE Alert

CVE-2024-47705

UNKNOWN 0.0

block: fix potential invalid pointer dereference in blk_add_partition

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: block: fix potential invalid pointer dereference in blk_add_partition The blk_add_partition() function initially used a single if-condition (IS_ERR(part)) to check for errors when adding a partition. This was modified to handle the specific case of -ENXIO separately, allowing the function to proceed without logging the error in this case. However, this change unintentionally left a path where md_autodetect_dev() could be called without confirming that part is a valid pointer. This commit separates the error handling logic by splitting the initial if-condition, improving code readability and handling specific error scenarios explicitly. The function now distinguishes the general error case from -ENXIO without altering the existing behavior of md_autodetect_dev() calls.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b72053072c0bbe9f1cdfe2ffa3c201c185da2201 < 4bc4272e2506941c3f3d4fb8b0c659ee814dcf6f b72053072c0bbe9f1cdfe2ffa3c201c185da2201 < cc4d21d9492db4e534d3e01253cf885c90dd2a8b b72053072c0bbe9f1cdfe2ffa3c201c185da2201 < 64cf2a39202ca2d9df5ee70eb310b6141ce2b8ed b72053072c0bbe9f1cdfe2ffa3c201c185da2201 < 80f5bfbb80ea1615290dbc24f49d3d8c86db58fe b72053072c0bbe9f1cdfe2ffa3c201c185da2201 < 652039ba477c9a4ab43740cf2cb0d068d53508c2 b72053072c0bbe9f1cdfe2ffa3c201c185da2201 < afe53ea9b378c376101d99d216f13b6256f75189 b72053072c0bbe9f1cdfe2ffa3c201c185da2201 < 26e197b7f9240a4ac301dd0ad520c0c697c2ea7d
Linux / Linux
5.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/4bc4272e2506941c3f3d4fb8b0c659ee814dcf6f git.kernel.org: https://git.kernel.org/stable/c/cc4d21d9492db4e534d3e01253cf885c90dd2a8b git.kernel.org: https://git.kernel.org/stable/c/64cf2a39202ca2d9df5ee70eb310b6141ce2b8ed git.kernel.org: https://git.kernel.org/stable/c/80f5bfbb80ea1615290dbc24f49d3d8c86db58fe git.kernel.org: https://git.kernel.org/stable/c/652039ba477c9a4ab43740cf2cb0d068d53508c2 git.kernel.org: https://git.kernel.org/stable/c/afe53ea9b378c376101d99d216f13b6256f75189 git.kernel.org: https://git.kernel.org/stable/c/26e197b7f9240a4ac301dd0ad520c0c697c2ea7d lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html