We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-53221

f2fs: fix null-ptr-deref in f2fs_submit_page_bio()



Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix null-ptr-deref in f2fs_submit_page_bio() There's issue as follows when concurrently installing the f2fs.ko module and mounting the f2fs file system: KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] RIP: 0010:__bio_alloc+0x2fb/0x6c0 [f2fs] Call Trace: <TASK> f2fs_submit_page_bio+0x126/0x8b0 [f2fs] __get_meta_page+0x1d4/0x920 [f2fs] get_checkpoint_version.constprop.0+0x2b/0x3c0 [f2fs] validate_checkpoint+0xac/0x290 [f2fs] f2fs_get_valid_checkpoint+0x207/0x950 [f2fs] f2fs_fill_super+0x1007/0x39b0 [f2fs] mount_bdev+0x183/0x250 legacy_get_tree+0xf4/0x1e0 vfs_get_tree+0x88/0x340 do_new_mount+0x283/0x5e0 path_mount+0x2b2/0x15b0 __x64_sys_mount+0x1fe/0x270 do_syscall_64+0x5f/0x170 entry_SYSCALL_64_after_hwframe+0x76/0x7e Above issue happens as the biset of the f2fs file system is not initialized before register "f2fs_fs_type". To address above issue just register "f2fs_fs_type" at the last in init_f2fs_fs(). Ensure that all f2fs file system resources are initialized.

Reserved 2024-11-19 | Published 2024-12-27 | Updated 2025-01-17 | Assigner Linux

Product status

Default status
unaffected

f543805fcd60f3f9a491cfa2f2dc9284d2569c28 before 8dddc12d03248755d9f709bc1eb9e3ea2bf1b322
affected

f543805fcd60f3f9a491cfa2f2dc9284d2569c28 before 32f5e291b7677495f98246eec573767430321c08
affected

f543805fcd60f3f9a491cfa2f2dc9284d2569c28 before 9e11b1d5fda972f6be60ab732976a7c8e064cd56
affected

f543805fcd60f3f9a491cfa2f2dc9284d2569c28 before b7d0a97b28083084ebdd8e5c6bccd12e6ec18faa
affected

Default status
affected

5.6
affected

Any version before 5.6
unaffected

6.6.72
unaffected

6.11.11
unaffected

6.12.2
unaffected

6.13-rc1
unaffected

References

git.kernel.org/...c/8dddc12d03248755d9f709bc1eb9e3ea2bf1b322

git.kernel.org/...c/32f5e291b7677495f98246eec573767430321c08

git.kernel.org/...c/9e11b1d5fda972f6be60ab732976a7c8e064cd56

git.kernel.org/...c/b7d0a97b28083084ebdd8e5c6bccd12e6ec18faa

cve.org (CVE-2024-53221)

nvd.nist.gov (CVE-2024-53221)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-53221

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.