
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's NILFS2 file system implementation has been identified as CVE-2024-53130. The issue was discovered in the blockdirtybuffer tracepoint functionality, where markbufferdirty() could cause a NULL pointer dereference or a general protection fault when KASAN (Kernel Address Sanitizer) is enabled (NVD). The vulnerability affects Linux kernel versions from 3.9 up to (excluding) 6.1.119, from 6.6.0 up to (excluding) 6.6.63, and from 6.11.0 up to (excluding) 6.11.10.
The vulnerability occurs because the tracepoint added in markbufferdirty() references the devt member bh->bbdev->bddev regardless of whether the buffer head has a pointer to a blockdevice structure. In the nilfsgrabbuffer() implementation, the block device is only set if the buffer is not in the "uptodate" state. When the uptodate flag is set on a folio/page and buffer heads are detached and reattached, the uptodate flag may be restored without setting bh->b_bdev, leading to the vulnerability (Kernel Patch). The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, this vulnerability can cause a NULL pointer dereference or a general protection fault in the Linux kernel when using the NILFS2 file system with the block:blockdirtybuffer tracepoint enabled. This can lead to a denial of service condition, potentially affecting system stability and availability (NVD).
The vulnerability has been fixed by modifying nilfsgrabbuffer() to always set the block device of the super block structure to the buffer head, regardless of the buffer's uptodate flag state. The fix has been implemented in various kernel versions, including 5.10.234-1 for Debian 11 and 6.1.119-1~deb11u1 for backported kernels (Debian Security). Users are advised to upgrade their systems to the patched versions.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."