{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T04:49:22.750","vulnerabilities":[{"cve":{"id":"CVE-2024-42079","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-07-29T16:15:07.180","lastModified":"2026-03-17T17:27:38.303","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix NULL pointer dereference in gfs2_log_flush\n\nIn gfs2_jindex_free(), set sdp->sd_jdesc to NULL under the log flush\nlock to provide exclusion against gfs2_log_flush().\n\nIn gfs2_log_flush(), check if sdp->sd_jdesc is non-NULL before\ndereferencing it.  Otherwise, we could run into a NULL pointer\ndereference when outstanding glock work races with an unmount\n(glock_work_func -> run_queue -> do_xmote -> inode_go_sync ->\ngfs2_log_flush)."},{"lang":"es","value":" En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gfs2: corrige la desreferencia del puntero NULL en gfs2_log_flush En gfs2_jindex_free(), establezca sdp-&gt;sd_jdesc en NULL bajo el bloqueo de descarga de registros para proporcionar exclusión contra gfs2_log_flush(). En gfs2_log_flush(), verifique si sdp-&gt;sd_jdesc no es NULL antes de desreferenciarlo. De lo contrario, podríamos encontrarnos con una desreferencia de puntero NULL cuando el trabajo de glock pendiente se ejecuta con un desmontaje (glock_work_func -&gt; run_queue -&gt; do_xmote -&gt; inode_go_sync -&gt; gfs2_log_flush)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.37","matchCriteriaId":"816250D9-9650-4A7D-A4A7-1D69242F2032"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.9.8","matchCriteriaId":"E95105F2-32E3-4C5F-9D18-7AEFD0E6275C"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/5f6a84cfb33b34610623857bd93919dcb661e29b","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/c3c5cfa3170c0940bc66a142859caac07d19b9d6","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/3429ef5f50909cee9e498c50f0c499b9397116ce","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/35264909e9d1973ab9aaa2a1b07cda70f12bb828","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}