CVE-2024-26773

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26773
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26773.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26773
Downstream
Related
Published
2024-04-03T17:00:59.757Z
Modified
2025-11-28T02:35:04.923443Z
Summary
ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid allocating blocks from corrupted group in ext4mbtrybestfound()

Determine if the group block bitmap is corrupted before using acbex in ext4mbtrybestfound() to avoid allocating blocks from a group with a corrupted block bitmap in the following concurrency and making the situation worse.

ext4mbregularallocator ext4lockgroup(sb, group) ext4mbgoodgroup // check if the group bbitmap is corrupted ext4mbcomplexscangroup // Scan group gets acbex but doesn't use it ext4unlockgroup(sb, group) ext4markgroupbitmapcorrupted(group) // The block bitmap was corrupted during // the group unlock gap. ext4mbtrybestfound ext4lockgroup(ac->acsb, group) ext4mbusebestfound mbmark_used // Allocating blocks in block bitmap corrupted group

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26773.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
21f8cfe79f776287459343e9cfa6055af61328ea
Fixed
260fc96283c0f594de18a1b045faf6d8fb42874d
Fixed
927794a02169778c9c2e7b25c768ab3ea8c1dc03
Fixed
4c21fa60a6f4606f6214a38f50612b17b2f738f5
Fixed
f97e75fa4e12b0aa0224e83fcbda8853ac2adf36
Fixed
0184747b552d6b5a14db3b7fcc3b792ce64dedd1
Fixed
a2576ae9a35c078e488f2c573e9e6821d651fbbe
Fixed
4530b3660d396a646aad91a787b6ab37cf604b53

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.308
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.270
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.211
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.150
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.80
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.19
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.7