In the Linux kernel, the following vulnerability has been resolved:
block: refine the EOF check in blkdev_iomap_begin
blkdev_iomap_begin rounds down the offset to the logical block size
before stashing it in iomap->offset and checking that it still is
inside the inode size.
Check the i_size check to the raw pos value so that we don't try a
zero size write if iter->pos is unaligned.
References
Configurations
Configuration 1 (hide)
|
History
03 Oct 2025, 15:22
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux
Linux linux Kernel |
|
CWE | NVD-CWE-noinfo | |
References | () https://git.kernel.org/stable/c/0c12028aec837f5a002009bbf68d179d506510e8 - Patch | |
References | () https://git.kernel.org/stable/c/10b723bcba8986537a484aa94dbfc9093fd776a1 - Patch | |
References | () https://git.kernel.org/stable/c/72c54e063c32aeb38d43a2bd897821e6e5a1757d - Patch | |
References | () https://git.kernel.org/stable/c/910717920c8c3f9386277a44c44d448058a18084 - Patch |
Information
Published : 2024-06-19 14:15
Updated : 2025-10-03 15:22
NVD link : CVE-2024-38604
Mitre link : CVE-2024-38604
CVE.ORG link : CVE-2024-38604
JSON object : View
Products Affected
linux
- linux_kernel
CWE