CVE-2024-26601

In the Linux kernel, the following vulnerability has been resolved: ext4: regenerate buddy after block freeing failed if under fc replay This mostly reverts commit 6bd97bf273bd ("ext4: remove redundant mb_regenerate_buddy()") and reintroduces mb_regenerate_buddy(). Based on code in mb_free_blocks(), fast commit replay can end up marking as free blocks that are already marked as such. This causes corruption of the buddy bitmap so we need to regenerate it in that case.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:02

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/6b0d48647935e4b8c7b75d1eccb9043fcd4ee581 - Patch () https://git.kernel.org/stable/c/6b0d48647935e4b8c7b75d1eccb9043fcd4ee581 - Patch
References () https://git.kernel.org/stable/c/78327acd4cdc4a1601af718b781eece577b6b7d4 - Patch () https://git.kernel.org/stable/c/78327acd4cdc4a1601af718b781eece577b6b7d4 - Patch
References () https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a - Patch () https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a - Patch
References () https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326 - Patch () https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326 - Patch
References () https://git.kernel.org/stable/c/c9b528c35795b711331ed36dc3dbee90d5812d4e - Patch () https://git.kernel.org/stable/c/c9b528c35795b711331ed36dc3dbee90d5812d4e - Patch
References () https://git.kernel.org/stable/c/ea42d6cffb0dd27a417f410b9d0011e9859328cb - Patch () https://git.kernel.org/stable/c/ea42d6cffb0dd27a417f410b9d0011e9859328cb - Patch

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

17 Apr 2024, 18:03

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/6b0d48647935e4b8c7b75d1eccb9043fcd4ee581 - () https://git.kernel.org/stable/c/6b0d48647935e4b8c7b75d1eccb9043fcd4ee581 - Patch
References () https://git.kernel.org/stable/c/78327acd4cdc4a1601af718b781eece577b6b7d4 - () https://git.kernel.org/stable/c/78327acd4cdc4a1601af718b781eece577b6b7d4 - Patch
References () https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a - () https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a - Patch
References () https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326 - () https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326 - Patch
References () https://git.kernel.org/stable/c/c9b528c35795b711331ed36dc3dbee90d5812d4e - () https://git.kernel.org/stable/c/c9b528c35795b711331ed36dc3dbee90d5812d4e - Patch
References () https://git.kernel.org/stable/c/ea42d6cffb0dd27a417f410b9d0011e9859328cb - () https://git.kernel.org/stable/c/ea42d6cffb0dd27a417f410b9d0011e9859328cb - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo

01 Mar 2024, 14:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: regenerar amigo después de que falló la liberación del bloque si se encuentra en reproducción fc. Esto revierte principalmente el commit 6bd97bf273bd ("ext4: eliminar mb_regenerate_buddy() redundante") y reintroduce mb_regenerate_buddy(). Según el código en mb_free_blocks(), la repetición de commit rápido puede terminar marcando como bloques libres que ya están marcados como tales. Esto causa corrupción en el mapa de bits del amigo, por lo que debemos regenerarlo en ese caso.
References
  • () https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a -
  • () https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326 -

26 Feb 2024, 16:27

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-26 16:27

Updated : 2024-11-21 09:02


NVD link : CVE-2024-26601

Mitre link : CVE-2024-26601

CVE.ORG link : CVE-2024-26601


JSON object : View

Products Affected

linux

  • linux_kernel