Bug 1227804 (CVE-2024-40951) - VUL-0: CVE-2024-40951: kernel: ocfs2: fix NULL pointer dereference in ocfs2_abort_trigger()
Summary: VUL-0: CVE-2024-40951: kernel: ocfs2: fix NULL pointer dereference in ocfs2_a...
Status: REOPENED
Alias: CVE-2024-40951
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/413878/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-07-15 12:59 UTC by SMASH SMASH
Modified: 2024-07-18 14:17 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-07-15 12:59:12 UTC
In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix NULL pointer dereference in ocfs2_abort_trigger()

bdev->bd_super has been removed and commit 8887b94d9322 change the usage
from bdev->bd_super to b_assoc_map->host->i_sb.  Since ocfs2 hasn't set
bh->b_assoc_map, it will trigger NULL pointer dereference when calling
into ocfs2_abort_trigger().

Actually this was pointed out in history, see commit 74e364ad1b13.  But
I've made a mistake when reviewing commit 8887b94d9322 and then
re-introduce this regression.

Since we cannot revive bdev in buffer head, so fix this issue by
initializing all types of ocfs2 triggers when fill super, and then get the
specific ocfs2 trigger from ocfs2_caching_info when access journal.

[joseph.qi@linux.alibaba.com: v2]
  Link: https://lkml.kernel.org/r/20240602112045.1112708-1-joseph.qi@linux.alibaba.com

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-40951
https://www.cve.org/CVERecord?id=CVE-2024-40951
https://git.kernel.org/stable/c/67bcecd780609f471260a8c83fb0ae15f27734ce
https://git.kernel.org/stable/c/685d03c3795378fca6a1b3d43581f7f1a3fc095f
https://git.kernel.org/stable/c/eb63357ef229fae061ce7ce2839d558681c42f1a
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-40951.mbox
Comment 2 Gianluca Gabrielli 2024-07-17 08:00:07 UTC
Sorry, I should have not closed this bug. Instead, I should wait for you to double-check and re-assign it back to us.