SB2024090536 - NULL pointer dereference in Linux kernel fscache
Published: September 5, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2024-45000)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the spin_lock() function in fs/fscache/cookie.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/b8a50877f68efdcc0be3fcc5116e00c31b90e45b
- https://git.kernel.org/stable/c/dfaa39b05a6cf34a16c525a2759ee6ab26b5fef6
- https://git.kernel.org/stable/c/0a4d41fa14b2a0efd40e350cfe8ec6a4c998ac1d
- https://git.kernel.org/stable/c/f71aa06398aabc2e3eaac25acdf3d62e0094ba70
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.107
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.7
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.48