CVE-2024-41034

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix kernel bug on rename operation of broken directory Syzbot reported that in rename directory operation on broken directory on nilfs2, __block_write_begin_int() called to prepare block write may fail BUG_ON check for access exceeding the folio/page size. This is because nilfs_dotdot(), which gets parent directory reference entry ("..") of the directory to be moved or renamed, does not check consistency enough, and may return location exceeding folio/page size for broken directories. Fix this issue by checking required directory entries ("." and "..") in the first chunk of the directory in nilfs_dotdot().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:*

History

07 Oct 2025, 16:29

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1a8879c0771a68d70ee2e5e66eea34207e8c6231 - () https://git.kernel.org/stable/c/1a8879c0771a68d70ee2e5e66eea34207e8c6231 - Patch
References () https://git.kernel.org/stable/c/24c1c8566a9b6be51f5347be2ea76e25fc82b11e - () https://git.kernel.org/stable/c/24c1c8566a9b6be51f5347be2ea76e25fc82b11e - Patch
References () https://git.kernel.org/stable/c/298cd810d7fb687c90a14d8f9fd1b8719a7cb8a5 - () https://git.kernel.org/stable/c/298cd810d7fb687c90a14d8f9fd1b8719a7cb8a5 - Patch
References () https://git.kernel.org/stable/c/60f61514374e4a0c3b65b08c6024dd7e26150bfd - () https://git.kernel.org/stable/c/60f61514374e4a0c3b65b08c6024dd7e26150bfd - Patch
References () https://git.kernel.org/stable/c/7000b438dda9d0f41a956fc9bffed92d2eb6be0d - () https://git.kernel.org/stable/c/7000b438dda9d0f41a956fc9bffed92d2eb6be0d - Patch
References () https://git.kernel.org/stable/c/a9a466a69b85059b341239766a10efdd3ee68a4b - () https://git.kernel.org/stable/c/a9a466a69b85059b341239766a10efdd3ee68a4b - Patch
References () https://git.kernel.org/stable/c/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 - () https://git.kernel.org/stable/c/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 - Patch
References () https://git.kernel.org/stable/c/ff9767ba2cb949701e45e6e4287f8af82986b703 - () https://git.kernel.org/stable/c/ff9767ba2cb949701e45e6e4287f8af82986b703 - Patch
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

21 Nov 2024, 09:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1a8879c0771a68d70ee2e5e66eea34207e8c6231 - () https://git.kernel.org/stable/c/1a8879c0771a68d70ee2e5e66eea34207e8c6231 -
References () https://git.kernel.org/stable/c/24c1c8566a9b6be51f5347be2ea76e25fc82b11e - () https://git.kernel.org/stable/c/24c1c8566a9b6be51f5347be2ea76e25fc82b11e -
References () https://git.kernel.org/stable/c/298cd810d7fb687c90a14d8f9fd1b8719a7cb8a5 - () https://git.kernel.org/stable/c/298cd810d7fb687c90a14d8f9fd1b8719a7cb8a5 -
References () https://git.kernel.org/stable/c/60f61514374e4a0c3b65b08c6024dd7e26150bfd - () https://git.kernel.org/stable/c/60f61514374e4a0c3b65b08c6024dd7e26150bfd -
References () https://git.kernel.org/stable/c/7000b438dda9d0f41a956fc9bffed92d2eb6be0d - () https://git.kernel.org/stable/c/7000b438dda9d0f41a956fc9bffed92d2eb6be0d -
References () https://git.kernel.org/stable/c/a9a466a69b85059b341239766a10efdd3ee68a4b - () https://git.kernel.org/stable/c/a9a466a69b85059b341239766a10efdd3ee68a4b -
References () https://git.kernel.org/stable/c/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 - () https://git.kernel.org/stable/c/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 -
References () https://git.kernel.org/stable/c/ff9767ba2cb949701e45e6e4287f8af82986b703 - () https://git.kernel.org/stable/c/ff9767ba2cb949701e45e6e4287f8af82986b703 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: nilfs2: corrige el error del kernel en la operación de cambio de nombre de un directorio roto Syzbot informó que en la operación de cambio de nombre de directorio en un directorio roto en nilfs2, __block_write_begin_int() llamado para preparar la escritura en bloque puede fallar en la verificación BUG_ON de acceso exceder el tamaño del folio/página. Esto se debe a que nilfs_dotdot(), que obtiene la entrada de referencia del directorio principal ("..") del directorio que se va a mover o cambiar de nombre, no verifica la coherencia lo suficiente y puede devolver una ubicación que exceda el tamaño de folio/página para directorios rotos. Solucione este problema verificando las entradas de directorio requeridas ("." y "..") en el primer fragmento del directorio en nilfs_dotdot().

29 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 15:15

Updated : 2025-10-07 16:29


NVD link : CVE-2024-41034

Mitre link : CVE-2024-41034

CVE.ORG link : CVE-2024-41034


JSON object : View

Products Affected

linux

  • linux_kernel