In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix kernel bug on rename operation of broken directory
Syzbot reported that in rename directory operation on broken directory on
nilfs2, __block_write_begin_int() called to prepare block write may fail
BUG_ON check for access exceeding the folio/page size.
This is because nilfs_dotdot(), which gets parent directory reference
entry ("..") of the directory to be moved or renamed, does not check
consistency enough, and may return location exceeding folio/page size for
broken directories.
Fix this issue by checking required directory entries ("." and "..") in
the first chunk of the directory in nilfs_dotdot().
References
Configurations
Configuration 1 (hide)
|
History
07 Oct 2025, 16:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1a8879c0771a68d70ee2e5e66eea34207e8c6231 - Patch | |
References | () https://git.kernel.org/stable/c/24c1c8566a9b6be51f5347be2ea76e25fc82b11e - Patch | |
References | () https://git.kernel.org/stable/c/298cd810d7fb687c90a14d8f9fd1b8719a7cb8a5 - Patch | |
References | () https://git.kernel.org/stable/c/60f61514374e4a0c3b65b08c6024dd7e26150bfd - Patch | |
References | () https://git.kernel.org/stable/c/7000b438dda9d0f41a956fc9bffed92d2eb6be0d - Patch | |
References | () https://git.kernel.org/stable/c/a9a466a69b85059b341239766a10efdd3ee68a4b - Patch | |
References | () https://git.kernel.org/stable/c/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 - Patch | |
References | () https://git.kernel.org/stable/c/ff9767ba2cb949701e45e6e4287f8af82986b703 - Patch | |
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
21 Nov 2024, 09:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1a8879c0771a68d70ee2e5e66eea34207e8c6231 - | |
References | () https://git.kernel.org/stable/c/24c1c8566a9b6be51f5347be2ea76e25fc82b11e - | |
References | () https://git.kernel.org/stable/c/298cd810d7fb687c90a14d8f9fd1b8719a7cb8a5 - | |
References | () https://git.kernel.org/stable/c/60f61514374e4a0c3b65b08c6024dd7e26150bfd - | |
References | () https://git.kernel.org/stable/c/7000b438dda9d0f41a956fc9bffed92d2eb6be0d - | |
References | () https://git.kernel.org/stable/c/a9a466a69b85059b341239766a10efdd3ee68a4b - | |
References | () https://git.kernel.org/stable/c/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 - | |
References | () https://git.kernel.org/stable/c/ff9767ba2cb949701e45e6e4287f8af82986b703 - | |
Summary |
|
29 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 15:15
Updated : 2025-10-07 16:29
NVD link : CVE-2024-41034
Mitre link : CVE-2024-41034
CVE.ORG link : CVE-2024-41034
JSON object : View
Products Affected
linux
- linux_kernel
CWE