CVE-2024-53130NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
OSV8.8OSV7.8
EPSS
0.0%
top 97.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 4
Latest updateNov 19

Description

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint When using the "block:block_dirty_buffer" tracepoint, mark_buffer_dirty() may cause a NULL pointer dereference, or a general protection fault when KASAN is enabled. This happens because, since the tracepoint was added in mark_buffer_dirty(), it references the dev_t member bh->b_bdev->bd_dev regardless of whether the buffer head has a pointer to a block_device structu

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages10 packages

Patches

🔴Vulnerability Details

43
OSV
linux-oracle vulnerabilities2025-11-19
OSV
linux-aws-fips vulnerabilities2025-09-24
OSV
linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle vulnerabilities2025-09-17
OSV
linux-fips, linux-azure-fips, linux-gcp-fips vulnerabilities2025-09-17
OSV
linux-aws vulnerabilities2025-09-02

📋Vendor Advisories

43
Ubuntu
Linux kernel (Oracle) vulnerabilities2025-11-19
Ubuntu
Linux kernel (AWS FIPS) vulnerabilities2025-09-24
Ubuntu
Linux kernel vulnerabilities2025-09-17
Ubuntu
Linux kernel (FIPS) vulnerabilities2025-09-17
Ubuntu
Linux kernel (AWS) vulnerabilities2025-09-02