We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-41077

null_blk: fix validation of block size



AssignerLinux
Reserved2024-07-12
Published2024-07-29
Updated2024-09-11

Description

In the Linux kernel, the following vulnerability has been resolved: null_blk: fix validation of block size Block size should be between 512 and PAGE_SIZE and be a power of 2. The current check does not validate this, so update the check. Without this patch, null_blk would Oops due to a null pointer deref when loaded with bs=1536 [1]. [axboe: remove unnecessary braces and != 0 check]

Product status

Default status
0x40019b4220

1da177e4c3f4 before 9625afe1dd4a
affected

1da177e4c3f4 before 9b873bdaae64
affected

1da177e4c3f4 before 2772ed2fc075
affected

1da177e4c3f4 before 08f03186b96e
affected

1da177e4c3f4 before f92409a9da02
affected

1da177e4c3f4 before c462ecd659b5
affected

Default status
0x40019b4330

5.10.223
unaffected

5.15.164
unaffected

6.1.101
unaffected

6.6.42
unaffected

6.9.11
unaffected

6.10
unaffected

References

https://git.kernel.org/stable/c/9625afe1dd4a158a14bb50f81af9e2dac634c0b1

https://git.kernel.org/stable/c/9b873bdaae64bddade9d8c6df23c8a31948d47d0

https://git.kernel.org/stable/c/2772ed2fc075eef7df3789906fc9dae01e4e132e

https://git.kernel.org/stable/c/08f03186b96e25e3154916a2e70732557c770ea7

https://git.kernel.org/stable/c/f92409a9da02f27d05d713bff5f865e386cef9b3

https://git.kernel.org/stable/c/c462ecd659b5fce731f1d592285832fd6ad54053

cve.org CVE-2024-41077

nvd.nist.gov CVE-2024-41077

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-41077
Subscribe to our newsletter to learn more about our work.