CVE-2024-26956

Source
https://cve.org/CVERecord?id=CVE-2024-26956
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26956.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26956
Downstream
Related
Published
2024-05-01T05:18:56.101Z
Modified
2026-03-13T07:52:01.064437Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
nilfs2: fix failure to detect DAT corruption in btree and direct mappings
Details

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix failure to detect DAT corruption in btree and direct mappings

Patch series "nilfs2: fix kernel bug at submitbhwbc()".

This resolves a kernel BUG reported by syzbot. Since there are two flaws involved, I've made each one a separate patch.

The first patch alone resolves the syzbot-reported bug, but I think both fixes should be sent to stable, so I've tagged them as such.

This patch (of 2):

Syzbot has reported a kernel bug in submitbhwbc() when writing file data to a nilfs2 file system whose metadata is corrupted.

There are two flaws involved in this issue.

The first flaw is that when nilfsgetblock() locates a data block using btree or direct mapping, if the disk address translation routine nilfsdattranslate() fails with internal code -ENOENT due to DAT metadata corruption, it can be passed back to nilfsgetblock(). This causes nilfsgetblock() to misidentify an existing block as non-existent, causing both data block lookup and insertion to fail inconsistently.

The second flaw is that nilfsgetblock() returns a successful status in this inconsistent state. This causes the caller _blockwritebeginint() or others to request a read even though the buffer is not mapped, resulting in a BUGON check for the BHMapped flag in submitbhwbc() failing.

This fixes the first issue by changing the return value to code -EINVAL when a conversion using DAT fails with code -ENOENT, avoiding the conflicting condition that leads to the kernel bug described above. Here, code -EINVAL indicates that metadata corruption was detected during the block lookup, which will be properly handled as a file system error and converted to -EIO when passing through the nilfs2 bmap layer.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26956.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c3a7abf06ce719a51139e62a034590be99abbc2c
Fixed
b67189690eb4b7ecc84ae16fa1e880e0123eaa35
Fixed
9cbe1ad5f4354f4df1445e5f4883983328cd6d8e
Fixed
c3b5c5c31e723b568f83d8cafab8629d9d830ffb
Fixed
2e2619ff5d0def4bb6c2037a32a6eaa28dd95c84
Fixed
46b832e09d43b394ac0f6d9485d2b1a06593f0b7
Fixed
f69e81396aea66304d214f175aa371f1b5578862
Fixed
a8e4d098de1c0f4c5c1f2ed4633a860f0da6d713
Fixed
82827ca21e7c8a91384c5baa656f78a5adfa4ab4
Fixed
f2f26b4a84a0ef41791bd2d70861c8eac748f4ba

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26956.json"