CVE-2024-26697

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix data corruption in dsync block recovery for small block sizes The helper function nilfs_recovery_copy_block() of nilfs_recovery_dsync_blocks(), which recovers data from logs created by data sync writes during a mount after an unclean shutdown, incorrectly calculates the on-page offset when copying repair data to the file's page cache. In environments where the block size is smaller than the page size, this flaw can cause data corruption and leak uninitialized memory bytes during the recovery process. Fix these issues by correcting this byte offset calculation on the page.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

17 Mar 2025, 15:37

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5 - () https://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5 - Patch
References () https://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9 - () https://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9 - Patch
References () https://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d - () https://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d - Patch
References () https://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa - () https://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa - Patch
References () https://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65 - () https://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65 - Patch
References () https://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1 - () https://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1 - Patch
References () https://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3 - () https://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3 - Patch
References () https://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba - () https://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

21 Nov 2024, 09:02

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5 - () https://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5 -
References () https://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9 - () https://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9 -
References () https://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d - () https://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d -
References () https://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa - () https://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa -
References () https://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65 - () https://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65 -
References () https://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1 - () https://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1 -
References () https://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3 - () https://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3 -
References () https://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba - () https://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

03 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 15:15

Updated : 2025-03-17 15:37


NVD link : CVE-2024-26697

Mitre link : CVE-2024-26697

CVE.ORG link : CVE-2024-26697


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write