CVE-2024-49877
ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate When doing cleanup, if flags without OCFS2_BH_READAHEAD, it may trigger NULL pointer dereference in the following ocfs2_set_buffer_uptodate() if bh is NULL.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 21, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
6c150df9c2e80b5cf86f5a0d98beb7390ad63bfc < 190d98bcd61117a78fe185222d162180f061a6ca cf76c78595ca87548ca5e45c862ac9e0949c4687 < e68c8323355e8cedfbe0bec7d5a39009f61640b6 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 61b84013e560382cbe7dd56758be3154d43a3988 cf76c78595ca87548ca5e45c862ac9e0949c4687 < df944dc46d06af65a75191183d52be017e6b9dbe cf76c78595ca87548ca5e45c862ac9e0949c4687 < 01cb2e751cc61ade454c9bc1aaa2eac1f8197112 cf76c78595ca87548ca5e45c862ac9e0949c4687 < d52c5652e7dcb7a0648bbb8642cc3e617070ab49 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 46b1edf0536a5291a8ad2337f88c926214b209d9 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 4846e72ab5a0726e49ad4188b9d9df091ae78c64 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 33b525cef4cff49e216e4133cc48452e11c0391e 01f93d5e36753fc4d06ec67f05ce78c9c6f2dd56 65cbd1279f4b999d56a838344a30642db24cd215 97e1db17bc1ef4c2e1789bc9323c7be44fba53f8
Linux / Linux
4.20
References
git.kernel.org: https://git.kernel.org/stable/c/190d98bcd61117a78fe185222d162180f061a6ca git.kernel.org: https://git.kernel.org/stable/c/e68c8323355e8cedfbe0bec7d5a39009f61640b6 git.kernel.org: https://git.kernel.org/stable/c/61b84013e560382cbe7dd56758be3154d43a3988 git.kernel.org: https://git.kernel.org/stable/c/df944dc46d06af65a75191183d52be017e6b9dbe git.kernel.org: https://git.kernel.org/stable/c/01cb2e751cc61ade454c9bc1aaa2eac1f8197112 git.kernel.org: https://git.kernel.org/stable/c/d52c5652e7dcb7a0648bbb8642cc3e617070ab49 git.kernel.org: https://git.kernel.org/stable/c/46b1edf0536a5291a8ad2337f88c926214b209d9 git.kernel.org: https://git.kernel.org/stable/c/4846e72ab5a0726e49ad4188b9d9df091ae78c64 git.kernel.org: https://git.kernel.org/stable/c/33b525cef4cff49e216e4133cc48452e11c0391e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html