Linux Kernel up to 6.6.46/6.10.4 ext4_force_shutdown null pointer dereference 🚫 [False Positive]

Notice
⚠️ This issue looks like a false-positive. Please review the listed sources and think about not using this entry.
Product
Type
Vendor
Name
Version
- 6.6.0
- 6.6.1
- 6.6.2
- 6.6.3
- 6.6.4
- 6.6.5
- 6.6.6
- 6.6.7
- 6.6.8
- 6.6.9
- 6.6.10
- 6.6.11
- 6.6.12
- 6.6.13
- 6.6.14
- 6.6.15
- 6.6.16
- 6.6.17
- 6.6.18
- 6.6.19
- 6.6.20
- 6.6.21
- 6.6.22
- 6.6.23
- 6.6.24
- 6.6.25
- 6.6.26
- 6.6.27
- 6.6.28
- 6.6.29
- 6.6.30
- 6.6.31
- 6.6.32
- 6.6.33
- 6.6.34
- 6.6.35
- 6.6.36
- 6.6.37
- 6.6.38
- 6.6.39
- 6.6.40
- 6.6.41
- 6.6.42
- 6.6.43
- 6.6.44
- 6.6.45
- 6.6.46
- 6.10.0
- 6.10.1
- 6.10.2
- 6.10.3
- 6.10.4
License
Website
- Vendor: https://www.kernel.org/
Timeline
08/17/2024 🔍08/26/2024 🔍
08/26/2024 🔍
01/17/2026 🔍
Sources
Vendor: kernel.orgAdvisory: git.kernel.org
False Positive: Yes
CVE: CVE-2024-43898 (🔍)
GCVE (CVE): GCVE-0-2024-43898
GCVE (VulDB): GCVE-100-275779
CERT Bund: WID-SEC-2025-2855 - IBM DataPower Gateway: Mehrere Schwachstellen
Entry
Created: 08/26/2024 13:34Updated: 01/17/2026 00:54
Changes: 08/26/2024 13:34 (22), 08/26/2024 13:35 (36), 08/27/2024 14:16 (1), 09/06/2024 05:40 (11), 09/10/2024 10:39 (3), 10/09/2024 23:59 (2), 12/16/2025 15:27 (7), 01/17/2026 00:54 (1)
Complete: 🔍
Cache ID: 216::103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.