CVE-2024-41077

high

Description

In the Linux kernel, the following vulnerability has been resolved: null_blk: fix validation of block size Block size should be between 512 and PAGE_SIZE and be a power of 2. The current check does not validate this, so update the check. Without this patch, null_blk would Oops due to a null pointer deref when loaded with bs=1536 [1]. [axboe: remove unnecessary braces and != 0 check]

References

https://git.kernel.org/stable/c/f92409a9da02f27d05d713bff5f865e386cef9b3

https://git.kernel.org/stable/c/c462ecd659b5fce731f1d592285832fd6ad54053

https://git.kernel.org/stable/c/9b873bdaae64bddade9d8c6df23c8a31948d47d0

https://git.kernel.org/stable/c/9625afe1dd4a158a14bb50f81af9e2dac634c0b1

https://git.kernel.org/stable/c/2772ed2fc075eef7df3789906fc9dae01e4e132e

https://git.kernel.org/stable/c/08f03186b96e25e3154916a2e70732557c770ea7

Details

Source: Mitre, NVD

Published: 2024-07-29

Updated: 2024-07-29

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High