CVE-2024-42077

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/07/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ocfs2: fix DIO failure due to insufficient transaction credits<br /> <br /> The code in ocfs2_dio_end_io_write() estimates number of necessary<br /> transaction credits using ocfs2_calc_extend_credits(). This however does<br /> not take into account that the IO could be arbitrarily large and can<br /> contain arbitrary number of extents.<br /> <br /> Extent tree manipulations do often extend the current transaction but not<br /> in all of the cases. For example if we have only single block extents in<br /> the tree, ocfs2_mark_extent_written() will end up calling<br /> ocfs2_replace_extent_rec() all the time and we will never extend the<br /> current transaction and eventually exhaust all the transaction credits if<br /> the IO contains many single block extents. Once that happens a<br /> WARN_ON(jbd2_handle_buffer_credits(handle)

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.6 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.7 (including) 5.10.221 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.162 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.97 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.37 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.9.8 (excluding)