CVE-2024-33847
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/06/2024
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: compress: don&#39;t allow unaligned truncation on released compress inode<br />
<br />
f2fs image may be corrupted after below testcase:<br />
- mkfs.f2fs -O extra_attr,compression -f /dev/vdb<br />
- mount /dev/vdb /mnt/f2fs<br />
- touch /mnt/f2fs/file<br />
- f2fs_io setflags compression /mnt/f2fs/file<br />
- dd if=/dev/zero of=/mnt/f2fs/file bs=4k count=4<br />
- f2fs_io release_cblocks /mnt/f2fs/file<br />
- truncate -s 8192 /mnt/f2fs/file<br />
- umount /mnt/f2fs<br />
- fsck.f2fs /dev/vdb<br />
<br />
[ASSERT] (fsck_chk_inode_blk:1256) --> ino: 0x5 has i_blocks: 0x00000002, but has 0x3 blocks<br />
[FSCK] valid_block_count matching with CP [Fail] [0x4, 0x5]<br />
[FSCK] other corrupted bugs [Fail]<br />
<br />
The reason is: partial truncation assume compressed inode has reserved<br />
blocks, after partial truncation, valid block count may change w/o<br />
.i_blocks and .total_valid_block_count update, result in corruption.<br />
<br />
This patch only allow cluster size aligned truncation on released<br />
compress inode for fixing.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 5.15.161 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.93 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/29ed2b5dd521ce7c5d8466cd70bf0cc9d07afeee
- https://git.kernel.org/stable/c/3ccf5210dc941a7aa0180596ac021568be4d35ec
- https://git.kernel.org/stable/c/5268241b41b1c5d0acca75e9b97d4fd719251c8c
- https://git.kernel.org/stable/c/8acae047215024d1ac499b3c8337ef1b952f160b
- https://git.kernel.org/stable/c/9f9341064a9b5246a32a7fe56b9f80c6f7f3c62d
- https://git.kernel.org/stable/c/b8962cf98595d1ec62f40f23667de830567ec8bc
- https://git.kernel.org/stable/c/29ed2b5dd521ce7c5d8466cd70bf0cc9d07afeee
- https://git.kernel.org/stable/c/3ccf5210dc941a7aa0180596ac021568be4d35ec
- https://git.kernel.org/stable/c/5268241b41b1c5d0acca75e9b97d4fd719251c8c
- https://git.kernel.org/stable/c/8acae047215024d1ac499b3c8337ef1b952f160b
- https://git.kernel.org/stable/c/9f9341064a9b5246a32a7fe56b9f80c6f7f3c62d
- https://git.kernel.org/stable/c/b8962cf98595d1ec62f40f23667de830567ec8bc



