๐Ÿ” CVE Alert

CVE-2024-49877

UNKNOWN 0.0

ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate When doing cleanup, if flags without OCFS2_BH_READAHEAD, it may trigger NULL pointer dereference in the following ocfs2_set_buffer_uptodate() if bh is NULL.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
6c150df9c2e80b5cf86f5a0d98beb7390ad63bfc < 190d98bcd61117a78fe185222d162180f061a6ca cf76c78595ca87548ca5e45c862ac9e0949c4687 < e68c8323355e8cedfbe0bec7d5a39009f61640b6 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 61b84013e560382cbe7dd56758be3154d43a3988 cf76c78595ca87548ca5e45c862ac9e0949c4687 < df944dc46d06af65a75191183d52be017e6b9dbe cf76c78595ca87548ca5e45c862ac9e0949c4687 < 01cb2e751cc61ade454c9bc1aaa2eac1f8197112 cf76c78595ca87548ca5e45c862ac9e0949c4687 < d52c5652e7dcb7a0648bbb8642cc3e617070ab49 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 46b1edf0536a5291a8ad2337f88c926214b209d9 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 4846e72ab5a0726e49ad4188b9d9df091ae78c64 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 33b525cef4cff49e216e4133cc48452e11c0391e 01f93d5e36753fc4d06ec67f05ce78c9c6f2dd56 65cbd1279f4b999d56a838344a30642db24cd215 97e1db17bc1ef4c2e1789bc9323c7be44fba53f8
Linux / Linux
4.20

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/190d98bcd61117a78fe185222d162180f061a6ca git.kernel.org: https://git.kernel.org/stable/c/e68c8323355e8cedfbe0bec7d5a39009f61640b6 git.kernel.org: https://git.kernel.org/stable/c/61b84013e560382cbe7dd56758be3154d43a3988 git.kernel.org: https://git.kernel.org/stable/c/df944dc46d06af65a75191183d52be017e6b9dbe git.kernel.org: https://git.kernel.org/stable/c/01cb2e751cc61ade454c9bc1aaa2eac1f8197112 git.kernel.org: https://git.kernel.org/stable/c/d52c5652e7dcb7a0648bbb8642cc3e617070ab49 git.kernel.org: https://git.kernel.org/stable/c/46b1edf0536a5291a8ad2337f88c926214b209d9 git.kernel.org: https://git.kernel.org/stable/c/4846e72ab5a0726e49ad4188b9d9df091ae78c64 git.kernel.org: https://git.kernel.org/stable/c/33b525cef4cff49e216e4133cc48452e11c0391e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html