In the Linux kernel, the following vulnerability has been resolved:
udf: Avoid using corrupted block bitmap buffer
When the filesystem block bitmap is corrupted, we detect the corruption
while loading the bitmap and fail the allocation with error. However the
next allocation from the same bitmap will notice the bitmap buffer is
already loaded and tries to allocate from the bitmap with mixed results
(depending on the exact nature of the bitmap corruption). Fix the
problem by using BH_verified bit to indicate whether the bitmap is valid
or not.
References
Configurations
Configuration 1 (hide)
|
History
07 Oct 2025, 20:26
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/2199e157a465aaf98294d3932797ecd7fce942d5 - Patch | |
References | () https://git.kernel.org/stable/c/271cab2ca00652bc984e269cf1208699a1e09cdd - Patch | |
References | () https://git.kernel.org/stable/c/57053b3bcf3403b80db6f65aba284d7dfe7326af - Patch | |
References | () https://git.kernel.org/stable/c/6a43e3c210df6c5f00570f4be49a897677dbcb64 - Patch | |
References | () https://git.kernel.org/stable/c/8ca170c39eca7cad6e0cfeb24e351d8f8eddcd65 - Patch | |
References | () https://git.kernel.org/stable/c/a90d4471146de21745980cba51ce88e7926bcc4f - Patch | |
References | () https://git.kernel.org/stable/c/cae9e59cc41683408b70b9ab569f8654866ba914 - Patch | |
CWE | NVD-CWE-noinfo | |
First Time |
Linux linux Kernel
Linux |
19 Aug 2024, 12:59
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Aug 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Aug 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-17 09:15
Updated : 2025-10-07 20:26
NVD link : CVE-2024-42306
Mitre link : CVE-2024-42306
CVE.ORG link : CVE-2024-42306
JSON object : View
Products Affected
linux
- linux_kernel
CWE