CVE-2024-42079NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
OSV8.8
EPSS
0.1%
top 79.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 29
Latest updateJan 20

Description

In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix NULL pointer dereference in gfs2_log_flush In gfs2_jindex_free(), set sdp->sd_jdesc to NULL under the log flush lock to provide exclusion against gfs2_log_flush(). In gfs2_log_flush(), check if sdp->sd_jdesc is non-NULL before dereferencing it. Otherwise, we could run into a NULL pointer dereference when outstanding glock work races with an unmount (glock_work_func -> run_queue -> do_xmote -> inode_go_sync -> gfs2_l

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages11 packages

Patches

🔴Vulnerability Details

19
OSV
linux-xilinx-zynqmp vulnerabilities2025-01-20
OSV
linux-azure, linux-intel-iotg-5.15 vulnerabilities2025-01-09
OSV
linux-azure-5.15 vulnerabilities2025-01-09
OSV
linux-intel-iotg vulnerabilities2025-01-06
OSV
linux-hwe-5.15 vulnerabilities2024-12-20

📋Vendor Advisories

20
Ubuntu
Linux kernel (Xilinx ZynqMP) vulnerabilities2025-01-20
Ubuntu
Linux kernel vulnerabilities2025-01-09
Ubuntu
Linux kernel (Azure) vulnerabilities2025-01-09
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2025-01-06
Ubuntu
Linux kernel (HWE) vulnerabilities2024-12-20