CVE-2024-34027

Source
https://cve.org/CVERecord?id=CVE-2024-34027
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-34027.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-34027
Downstream
Related
Published
2024-06-24T13:56:49.389Z
Modified
2026-03-13T07:54:51.081401Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
f2fs: compress: fix to cover {reserve,release}_compress_blocks() w/ cp_rwsem lock
Details

In the Linux kernel, the following vulnerability has been resolved:

f2fs: compress: fix to cover {reserve,release}compressblocks() w/ cp_rwsem lock

It needs to cover {reserve,release}compressblocks() w/ cprwsem lock to avoid racing with checkpoint, otherwise, filesystem metadata including blkaddr in dnode, inode fields and .totalvalidblockcount may be corrupted after SPO case.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/34xxx/CVE-2024-34027.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ef8d563f184e1112651f2cbde383d43e599334e8
Fixed
a6e1f7744e9b84f86a629a76024bba8468aa153b
Fixed
b5bac43875aa27ec032dbbb86173baae6dce6182
Fixed
5d47d63883735718825ca2efc4fca6915469774f
Fixed
329edb7c9e3b6ca27e6ca67ab1cdda1740fb3a2b
Fixed
69136304fd144144a4828c7b7b149d0f80321ba4
Fixed
0a4ed2d97cb6d044196cc3e726b6699222b41019

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-34027.json"