CVE-2024-58094

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/04/2025
Last modified:
28/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> jfs: add check read-only before truncation in jfs_truncate_nolock()<br /> <br /> Added a check for "read-only" mode in the `jfs_truncate_nolock`<br /> function to avoid errors related to writing to a read-only<br /> filesystem.<br /> <br /> Call stack:<br /> <br /> block_write_begin() {<br /> jfs_write_failed() {<br /> jfs_truncate() {<br /> jfs_truncate_nolock() {<br /> txEnd() {<br /> ...<br /> log = JFS_SBI(tblk-&gt;sb)-&gt;log;<br /> // (log == NULL)<br /> <br /> If the `isReadOnly(ip)` condition is triggered in<br /> `jfs_truncate_nolock`, the function execution will stop, and no<br /> further data modification will occur. Instead, the `xtTruncate`<br /> function will be called with the "COMMIT_WMAP" flag, preventing<br /> modifications in "read-only" mode.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.13 (including) 6.14.2 (excluding)
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*