๐Ÿ” CVE Alert

CVE-2024-53113

UNKNOWN 0.0

mm: fix NULL pointer dereference in alloc_pages_bulk_noprof

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof We triggered a NULL pointer dereference for ac.preferred_zoneref->zone in alloc_pages_bulk_noprof() when the task is migrated between cpusets. When cpuset is enabled, in prepare_alloc_pages(), ac->nodemask may be &current->mems_allowed. when first_zones_zonelist() is called to find preferred_zoneref, the ac->nodemask may be modified concurrently if the task is migrated between different cpusets. Assuming we have 2 NUMA Node, when traversing Node1 in ac->zonelist, the nodemask is 2, and when traversing Node2 in ac->zonelist, the nodemask is 1. As a result, the ac->preferred_zoneref points to NULL zone. In alloc_pages_bulk_noprof(), for_each_zone_zonelist_nodemask() finds a allowable zone and calls zonelist_node_idx(ac.preferred_zoneref), leading to NULL pointer dereference. __alloc_pages_noprof() fixes this issue by checking NULL pointer in commit ea57485af8f4 ("mm, page_alloc: fix check for NULL preferred_zone") and commit df76cee6bbeb ("mm, page_alloc: remove redundant checks from alloc fastpath"). To fix it, check NULL pointer for preferred_zoneref->zone.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 2, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
387ba26fb1cb9be9e35dc14a6d97188e916eda05 < 903d896448c2e50e8652aaba529a30d4d1eaa0e5 387ba26fb1cb9be9e35dc14a6d97188e916eda05 < 6addb2d9501ec866d7b3a3b4e665307c437e9be2 387ba26fb1cb9be9e35dc14a6d97188e916eda05 < d0f16cec79774c3132df006cf771eddd89d08f58 387ba26fb1cb9be9e35dc14a6d97188e916eda05 < 31502374627ba9ec3e710dbd0bb00457cc6d2c19 387ba26fb1cb9be9e35dc14a6d97188e916eda05 < 8ce41b0f9d77cca074df25afd39b86e2ee3aa68e
Linux / Linux
5.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/903d896448c2e50e8652aaba529a30d4d1eaa0e5 git.kernel.org: https://git.kernel.org/stable/c/6addb2d9501ec866d7b3a3b4e665307c437e9be2 git.kernel.org: https://git.kernel.org/stable/c/d0f16cec79774c3132df006cf771eddd89d08f58 git.kernel.org: https://git.kernel.org/stable/c/31502374627ba9ec3e710dbd0bb00457cc6d2c19 git.kernel.org: https://git.kernel.org/stable/c/8ce41b0f9d77cca074df25afd39b86e2ee3aa68e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html