CVE-2024-26774

Source
https://cve.org/CVERecord?id=CVE-2024-26774
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26774.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26774
Downstream
Related
Published
2024-04-03T17:01:00.618Z
Modified
2026-03-13T07:53:39.559833Z
Summary
ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid dividing by 0 in mbupdateavgfragmentsize() when block bitmap corrupt

Determine if bbfragments is 0 instead of determining bbfree to eliminate the risk of dividing by zero when the block bitmap is corrupted.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26774.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
83e80a6e3543f37f74c8e48a5f305b054b65ce2a
Fixed
8b40eb2e716b503f7a4e1090815a17b1341b2150
Fixed
f32d2a745b02123258026e105a008f474f896d6a
Fixed
8cf9cc602cfb40085967c0d140e32691c8b71cf3
Fixed
993bf0f4c393b3667830918f9247438a8f6fdb5b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
398a0fdb38d9ab5e68023667cc5e6e3d109e2d6b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26774.json"