5.5

CVE-2024-26956

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix failure to detect DAT corruption in btree and direct mappings

Patch series "nilfs2: fix kernel bug at submit_bh_wbc()".

This resolves a kernel BUG reported by syzbot.  Since there are two
flaws involved, I've made each one a separate patch.

The first patch alone resolves the syzbot-reported bug, but I think
both fixes should be sent to stable, so I've tagged them as such.


This patch (of 2):

Syzbot has reported a kernel bug in submit_bh_wbc() when writing file data
to a nilfs2 file system whose metadata is corrupted.

There are two flaws involved in this issue.

The first flaw is that when nilfs_get_block() locates a data block using
btree or direct mapping, if the disk address translation routine
nilfs_dat_translate() fails with internal code -ENOENT due to DAT metadata
corruption, it can be passed back to nilfs_get_block().  This causes
nilfs_get_block() to misidentify an existing block as non-existent,
causing both data block lookup and insertion to fail inconsistently.

The second flaw is that nilfs_get_block() returns a successful status in
this inconsistent state.  This causes the caller __block_write_begin_int()
or others to request a read even though the buffer is not mapped,
resulting in a BUG_ON check for the BH_Mapped flag in submit_bh_wbc()
failing.

This fixes the first issue by changing the return value to code -EINVAL
when a conversion using DAT fails with code -ENOENT, avoiding the
conflicting condition that leads to the kernel bug described above.  Here,
code -EINVAL indicates that metadata corruption was detected during the
block lookup, which will be properly handled as a file system error and
converted to -EIO when passing through the nilfs2 bmap layer.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < b67189690eb4b7ecc84ae16fa1e880e0123eaa35
Version c3a7abf06ce719a51139e62a034590be99abbc2c
Status affected
Version < 9cbe1ad5f4354f4df1445e5f4883983328cd6d8e
Version c3a7abf06ce719a51139e62a034590be99abbc2c
Status affected
Version < c3b5c5c31e723b568f83d8cafab8629d9d830ffb
Version c3a7abf06ce719a51139e62a034590be99abbc2c
Status affected
Version < 2e2619ff5d0def4bb6c2037a32a6eaa28dd95c84
Version c3a7abf06ce719a51139e62a034590be99abbc2c
Status affected
Version < 46b832e09d43b394ac0f6d9485d2b1a06593f0b7
Version c3a7abf06ce719a51139e62a034590be99abbc2c
Status affected
Version < f69e81396aea66304d214f175aa371f1b5578862
Version c3a7abf06ce719a51139e62a034590be99abbc2c
Status affected
Version < a8e4d098de1c0f4c5c1f2ed4633a860f0da6d713
Version c3a7abf06ce719a51139e62a034590be99abbc2c
Status affected
Version < 82827ca21e7c8a91384c5baa656f78a5adfa4ab4
Version c3a7abf06ce719a51139e62a034590be99abbc2c
Status affected
Version < f2f26b4a84a0ef41791bd2d70861c8eac748f4ba
Version c3a7abf06ce719a51139e62a034590be99abbc2c
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.31
Status affected
Version < 2.6.31
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.312
Status unaffected
Version <= 5.4.*
Version 5.4.274
Status unaffected
Version <= 5.10.*
Version 5.10.215
Status unaffected
Version <= 5.15.*
Version 5.15.154
Status unaffected
Version <= 6.1.*
Version 6.1.84
Status unaffected
Version <= 6.6.*
Version 6.6.24
Status unaffected
Version <= 6.7.*
Version 6.7.12
Status unaffected
Version <= 6.8.*
Version 6.8.3
Status unaffected
Version <= *
Version 6.9
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.01% 0.005
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
134c704f-9b21-4f2e-91b3-4a467353bcc0 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H