CVE-2024-26956
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2024
Last modified:
23/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nilfs2: fix failure to detect DAT corruption in btree and direct mappings<br />
<br />
Patch series "nilfs2: fix kernel bug at submit_bh_wbc()".<br />
<br />
This resolves a kernel BUG reported by syzbot. Since there are two<br />
flaws involved, I&#39;ve made each one a separate patch.<br />
<br />
The first patch alone resolves the syzbot-reported bug, but I think<br />
both fixes should be sent to stable, so I&#39;ve tagged them as such.<br />
<br />
<br />
This patch (of 2):<br />
<br />
Syzbot has reported a kernel bug in submit_bh_wbc() when writing file data<br />
to a nilfs2 file system whose metadata is corrupted.<br />
<br />
There are two flaws involved in this issue.<br />
<br />
The first flaw is that when nilfs_get_block() locates a data block using<br />
btree or direct mapping, if the disk address translation routine<br />
nilfs_dat_translate() fails with internal code -ENOENT due to DAT metadata<br />
corruption, it can be passed back to nilfs_get_block(). This causes<br />
nilfs_get_block() to misidentify an existing block as non-existent,<br />
causing both data block lookup and insertion to fail inconsistently.<br />
<br />
The second flaw is that nilfs_get_block() returns a successful status in<br />
this inconsistent state. This causes the caller __block_write_begin_int()<br />
or others to request a read even though the buffer is not mapped,<br />
resulting in a BUG_ON check for the BH_Mapped flag in submit_bh_wbc()<br />
failing.<br />
<br />
This fixes the first issue by changing the return value to code -EINVAL<br />
when a conversion using DAT fails with code -ENOENT, avoiding the<br />
conflicting condition that leads to the kernel bug described above. Here,<br />
code -EINVAL indicates that metadata corruption was detected during the<br />
block lookup, which will be properly handled as a file system error and<br />
converted to -EIO when passing through the nilfs2 bmap layer.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.31 (including) | 4.19.312 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.274 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.215 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.154 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.84 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.8.3 (excluding) |
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2e2619ff5d0def4bb6c2037a32a6eaa28dd95c84
- https://git.kernel.org/stable/c/46b832e09d43b394ac0f6d9485d2b1a06593f0b7
- https://git.kernel.org/stable/c/82827ca21e7c8a91384c5baa656f78a5adfa4ab4
- https://git.kernel.org/stable/c/9cbe1ad5f4354f4df1445e5f4883983328cd6d8e
- https://git.kernel.org/stable/c/a8e4d098de1c0f4c5c1f2ed4633a860f0da6d713
- https://git.kernel.org/stable/c/b67189690eb4b7ecc84ae16fa1e880e0123eaa35
- https://git.kernel.org/stable/c/c3b5c5c31e723b568f83d8cafab8629d9d830ffb
- https://git.kernel.org/stable/c/f2f26b4a84a0ef41791bd2d70861c8eac748f4ba
- https://git.kernel.org/stable/c/f69e81396aea66304d214f175aa371f1b5578862
- https://git.kernel.org/stable/c/2e2619ff5d0def4bb6c2037a32a6eaa28dd95c84
- https://git.kernel.org/stable/c/46b832e09d43b394ac0f6d9485d2b1a06593f0b7
- https://git.kernel.org/stable/c/82827ca21e7c8a91384c5baa656f78a5adfa4ab4
- https://git.kernel.org/stable/c/9cbe1ad5f4354f4df1445e5f4883983328cd6d8e
- https://git.kernel.org/stable/c/a8e4d098de1c0f4c5c1f2ed4633a860f0da6d713
- https://git.kernel.org/stable/c/b67189690eb4b7ecc84ae16fa1e880e0123eaa35
- https://git.kernel.org/stable/c/c3b5c5c31e723b568f83d8cafab8629d9d830ffb
- https://git.kernel.org/stable/c/f2f26b4a84a0ef41791bd2d70861c8eac748f4ba
- https://git.kernel.org/stable/c/f69e81396aea66304d214f175aa371f1b5578862
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html



