CVE-2024-26697

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix data corruption in dsync block recovery for small block sizes The helper function nilfs_recovery_copy_block() of nilfs_recovery_dsync_blocks(), which recovers data from logs created by data sync writes during a mount after an unclean shutdown, incorrectly calculates the on-page offset when copying repair data to the file's page cache. In environments where the block size is smaller than the page size, this flaw can cause data corruption and leak uninitialized memory bytes during the recovery process. Fix these issues by correcting this byte offset calculation on the page.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

17 Mar 2025, 15:37

Type Values Removed Values Added
First Time Debian debian Linux
Linux linux Kernel
Debian
Linux
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5 - () https://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5 - Patch
References () https://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9 - () https://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9 - Patch
References () https://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d - () https://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d - Patch
References () https://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa - () https://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa - Patch
References () https://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65 - () https://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65 - Patch
References () https://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1 - () https://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1 - Patch
References () https://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3 - () https://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3 - Patch
References () https://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba - () https://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

Information

Published : 2024-04-03 15:15

Updated : 2025-03-17 15:37


NVD link : CVE-2024-26697

Mitre link : CVE-2024-26697

CVE.ORG link : CVE-2024-26697


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write