CVE-2024-26772

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() Places the logic for checking if the group's block bitmap is corrupt under the protection of the group lock to avoid allocating blocks from the group with a corrupted block bitmap.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

04 Apr 2025, 14:16

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a - () https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a - Patch
References () https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43 - () https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43 - Patch
References () https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d - () https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d - Patch
References () https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513 - () https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513 - Patch
References () https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff - () https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff - Patch
References () https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916 - () https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916 - Patch
References () https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586 - () https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586 - Patch
References () https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7 - () https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
First Time Debian debian Linux
Linux linux Kernel
Debian
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a - () https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a -
References () https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43 - () https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43 -
References () https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d - () https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d -
References () https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513 - () https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513 -
References () https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff - () https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff -
References () https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916 - () https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916 -
References () https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586 - () https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586 -
References () https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7 - () https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7 -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

01 Nov 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: evita asignar bloques del grupo corrupto en ext4_mb_find_by_goal() Coloca la lógica para verificar si el mapa de bits del bloque del grupo está corrupto bajo la protección del bloqueo del grupo para evitar la asignación de bloques del grupo con un mapa de bits de bloque dañado.

03 Apr 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 17:15

Updated : 2025-04-04 14:16


NVD link : CVE-2024-26772

Mitre link : CVE-2024-26772

CVE.ORG link : CVE-2024-26772


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel