
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-53131 is a vulnerability in the Linux kernel's NILFS2 file system implementation that was discovered in December 2024. The issue involves a null pointer dereference bug that occurs when using the 'block:block_touch_buffer' tracepoint. Specifically, the touch_buffer() function called from __nilfs_get_folio_block() causes a NULL pointer dereference, or a general protection fault when KASAN is enabled (Kernel Patch).
The vulnerability occurs because the tracepoint added in touch_buffer() references the dev_t member bh->b_bdev->bd_dev regardless of whether the buffer head has a pointer to a block_device structure. In the implementation, the block_device structure is set after the function returns to the caller. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability can lead to a denial of service (system crash) through a NULL pointer dereference or a general protection fault when KASAN (Kernel Address Sanitizer) is enabled. The issue affects systems using the NILFS2 file system with block-related tracepoints enabled (Kernel Patch).
The issue has been fixed by eliminating the touch_buffer() call in the NILFS2 implementation, as the common search helper for folio/page used by the caller function was already optimized to mark the folio/page as accessed. The fix has been included in Linux kernel versions 5.10.234-1 for Debian 11 and 6.1.119-1 for newer distributions (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."