๐Ÿ” CVE Alert

CVE-2024-49957

UNKNOWN 0.0

ocfs2: fix null-ptr-deref when journal load failed.

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix null-ptr-deref when journal load failed. During the mounting process, if journal_reset() fails because of too short journal, then lead to jbd2_journal_load() fails with NULL j_sb_buffer. Subsequently, ocfs2_journal_shutdown() calls jbd2_journal_flush()->jbd2_cleanup_journal_tail()-> __jbd2_update_log_tail()->jbd2_journal_update_sb_log_tail() ->lock_buffer(journal->j_sb_buffer), resulting in a null-pointer dereference error. To resolve this issue, we should check the JBD2_LOADED flag to ensure the journal was properly loaded. Additionally, use journal instead of osb->journal directly to simplify the code.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f6f50e28f0cb8d7bcdfaacc83129f005dede11b1 < fd89d92c1140cee8f59de336cb37fa65e359c123 f6f50e28f0cb8d7bcdfaacc83129f005dede11b1 < 703b2c7e0798d263154dc8593dc2345f75dc077f f6f50e28f0cb8d7bcdfaacc83129f005dede11b1 < bf605ae98dab5c15c5b631d4d7f88898cb41b649 f6f50e28f0cb8d7bcdfaacc83129f005dede11b1 < ff55291fb36779819211b596da703389135f5b05 f6f50e28f0cb8d7bcdfaacc83129f005dede11b1 < 82dfdd1e31e774578f76ce6dc90c834f96403a0f f6f50e28f0cb8d7bcdfaacc83129f005dede11b1 < 86a89e75e9e4dfa768b97db466ad6bedf2e7ea5b f6f50e28f0cb8d7bcdfaacc83129f005dede11b1 < f60e94a83db799bde625ac8671a5b4a6354e7120 f6f50e28f0cb8d7bcdfaacc83129f005dede11b1 < 387bf565cc03e2e8c720b8b4798efea4aacb6962 f6f50e28f0cb8d7bcdfaacc83129f005dede11b1 < 5784d9fcfd43bd853654bb80c87ef293b9e8e80a
Linux / Linux
2.6.32

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/fd89d92c1140cee8f59de336cb37fa65e359c123 git.kernel.org: https://git.kernel.org/stable/c/703b2c7e0798d263154dc8593dc2345f75dc077f git.kernel.org: https://git.kernel.org/stable/c/bf605ae98dab5c15c5b631d4d7f88898cb41b649 git.kernel.org: https://git.kernel.org/stable/c/ff55291fb36779819211b596da703389135f5b05 git.kernel.org: https://git.kernel.org/stable/c/82dfdd1e31e774578f76ce6dc90c834f96403a0f git.kernel.org: https://git.kernel.org/stable/c/86a89e75e9e4dfa768b97db466ad6bedf2e7ea5b git.kernel.org: https://git.kernel.org/stable/c/f60e94a83db799bde625ac8671a5b4a6354e7120 git.kernel.org: https://git.kernel.org/stable/c/387bf565cc03e2e8c720b8b4798efea4aacb6962 git.kernel.org: https://git.kernel.org/stable/c/5784d9fcfd43bd853654bb80c87ef293b9e8e80a lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html