CVE-2024-42273

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/08/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> f2fs: assign CURSEG_ALL_DATA_ATGC if blkaddr is valid<br /> <br /> mkdir /mnt/test/comp<br /> f2fs_io setflags compression /mnt/test/comp<br /> dd if=/dev/zero of=/mnt/test/comp/testfile bs=16k count=1<br /> truncate --size 13 /mnt/test/comp/testfile<br /> <br /> In the above scenario, we can get a BUG_ON.<br /> kernel BUG at fs/f2fs/segment.c:3589!<br /> Call Trace:<br /> do_write_page+0x78/0x390 [f2fs]<br /> f2fs_outplace_write_data+0x62/0xb0 [f2fs]<br /> f2fs_do_write_data_page+0x275/0x740 [f2fs]<br /> f2fs_write_single_data_page+0x1dc/0x8f0 [f2fs]<br /> f2fs_write_multi_pages+0x1e5/0xae0 [f2fs]<br /> f2fs_write_cache_pages+0xab1/0xc60 [f2fs]<br /> f2fs_write_data_pages+0x2d8/0x330 [f2fs]<br /> do_writepages+0xcf/0x270<br /> __writeback_single_inode+0x44/0x350<br /> writeback_sb_inodes+0x242/0x530<br /> __writeback_inodes_wb+0x54/0xf0<br /> wb_writeback+0x192/0x310<br /> wb_workfn+0x30d/0x400<br /> <br /> The reason is we gave CURSEG_ALL_DATA_ATGC to COMPR_ADDR where the<br /> page was set the gcing flag by set_cluster_dirty().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.149 (including) 5.16 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.77 (including) 6.1.104 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.16 (including) 6.6.45 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7.4 (including) 6.10.4 (excluding)