CVE-2024-26697

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix data corruption in dsync block recovery for small block sizes The helper function nilfs_recovery_copy_block() of nilfs_recovery_dsync_blocks(), which recovers data from logs created by data sync writes during a mount after an unclean shutdown, incorrectly calculates the on-page offset when copying repair data to the file's page cache. In environments where the block size is smaller than the page size, this flaw can cause data corruption and leak uninitialized memory bytes during the recovery process. Fix these issues by correcting this byte offset calculation on the page.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

17 Mar 2025, 15:37

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5 - () https://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5 - Patch
References () https://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa - () https://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa - Patch
References () https://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d - () https://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d - Patch
References () https://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3 - () https://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3 - Patch
References () https://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65 - () https://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65 - Patch
References () https://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9 - () https://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9 - Patch
References () https://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba - () https://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba - Patch
References () https://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1 - () https://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
CWE CWE-787
First Time Debian debian Linux
Debian
Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'name': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'tags': [], 'refsource': ''}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'name': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'tags': [], 'refsource': ''}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

03 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 15:15

Updated : 2025-03-17 15:37


NVD link : CVE-2024-26697

Mitre link : CVE-2024-26697


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write