CVE-2024-26955

In the Linux kernel, the following vulnerability has been resolved: nilfs2: prevent kernel bug at submit_bh_wbc() Fix a bug where nilfs_get_block() returns a successful status when searching and inserting the specified block both fail inconsistently. If this inconsistent behavior is not due to a previously fixed bug, then an unexpected race is occurring, so return a temporary error -EAGAIN instead. This prevents callers such as __block_write_begin_int() from requesting a read into a buffer that is not mapped, which would cause the BUG_ON check for the BH_Mapped flag in submit_bh_wbc() to fail.
References
Link Resource
https://git.kernel.org/stable/c/0c8aa4cfda4e4adb15d5b6536d155eca9c9cd44c Patch
https://git.kernel.org/stable/c/192e9f9078c96be30b31c4b44d6294b24520fce5 Patch
https://git.kernel.org/stable/c/269cdf353b5bdd15f1a079671b0f889113865f20 Patch
https://git.kernel.org/stable/c/32eaee72e96590a75445c8a6c7c1057673b47e07 Patch
https://git.kernel.org/stable/c/48d443d200237782dc82e6b60663ec414ef02e39 Patch
https://git.kernel.org/stable/c/76ffbe911e2798c7296968f5fd72f7bf67207a8d Patch
https://git.kernel.org/stable/c/91e4c4595fae5e87069e44687ae879091783c183 Patch
https://git.kernel.org/stable/c/ca581d237f3b8539c044205bb003de71d75d227c Patch
https://git.kernel.org/stable/c/f0fe7ad5aff4f0fcf988913313c497de85f1e186 Patch
https://git.kernel.org/stable/c/0c8aa4cfda4e4adb15d5b6536d155eca9c9cd44c Patch
https://git.kernel.org/stable/c/192e9f9078c96be30b31c4b44d6294b24520fce5 Patch
https://git.kernel.org/stable/c/269cdf353b5bdd15f1a079671b0f889113865f20 Patch
https://git.kernel.org/stable/c/32eaee72e96590a75445c8a6c7c1057673b47e07 Patch
https://git.kernel.org/stable/c/48d443d200237782dc82e6b60663ec414ef02e39 Patch
https://git.kernel.org/stable/c/76ffbe911e2798c7296968f5fd72f7bf67207a8d Patch
https://git.kernel.org/stable/c/91e4c4595fae5e87069e44687ae879091783c183 Patch
https://git.kernel.org/stable/c/ca581d237f3b8539c044205bb003de71d75d227c Patch
https://git.kernel.org/stable/c/f0fe7ad5aff4f0fcf988913313c497de85f1e186 Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Third Party Advisory Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Third Party Advisory Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2025, 00:59

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0c8aa4cfda4e4adb15d5b6536d155eca9c9cd44c - () https://git.kernel.org/stable/c/0c8aa4cfda4e4adb15d5b6536d155eca9c9cd44c - Patch
References () https://git.kernel.org/stable/c/192e9f9078c96be30b31c4b44d6294b24520fce5 - () https://git.kernel.org/stable/c/192e9f9078c96be30b31c4b44d6294b24520fce5 - Patch
References () https://git.kernel.org/stable/c/269cdf353b5bdd15f1a079671b0f889113865f20 - () https://git.kernel.org/stable/c/269cdf353b5bdd15f1a079671b0f889113865f20 - Patch
References () https://git.kernel.org/stable/c/32eaee72e96590a75445c8a6c7c1057673b47e07 - () https://git.kernel.org/stable/c/32eaee72e96590a75445c8a6c7c1057673b47e07 - Patch
References () https://git.kernel.org/stable/c/48d443d200237782dc82e6b60663ec414ef02e39 - () https://git.kernel.org/stable/c/48d443d200237782dc82e6b60663ec414ef02e39 - Patch
References () https://git.kernel.org/stable/c/76ffbe911e2798c7296968f5fd72f7bf67207a8d - () https://git.kernel.org/stable/c/76ffbe911e2798c7296968f5fd72f7bf67207a8d - Patch
References () https://git.kernel.org/stable/c/91e4c4595fae5e87069e44687ae879091783c183 - () https://git.kernel.org/stable/c/91e4c4595fae5e87069e44687ae879091783c183 - Patch
References () https://git.kernel.org/stable/c/ca581d237f3b8539c044205bb003de71d75d227c - () https://git.kernel.org/stable/c/ca581d237f3b8539c044205bb003de71d75d227c - Patch
References () https://git.kernel.org/stable/c/f0fe7ad5aff4f0fcf988913313c497de85f1e186 - () https://git.kernel.org/stable/c/f0fe7ad5aff4f0fcf988913313c497de85f1e186 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory, Mailing List
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/0c8aa4cfda4e4adb15d5b6536d155eca9c9cd44c - () https://git.kernel.org/stable/c/0c8aa4cfda4e4adb15d5b6536d155eca9c9cd44c -
References () https://git.kernel.org/stable/c/192e9f9078c96be30b31c4b44d6294b24520fce5 - () https://git.kernel.org/stable/c/192e9f9078c96be30b31c4b44d6294b24520fce5 -
References () https://git.kernel.org/stable/c/269cdf353b5bdd15f1a079671b0f889113865f20 - () https://git.kernel.org/stable/c/269cdf353b5bdd15f1a079671b0f889113865f20 -
References () https://git.kernel.org/stable/c/32eaee72e96590a75445c8a6c7c1057673b47e07 - () https://git.kernel.org/stable/c/32eaee72e96590a75445c8a6c7c1057673b47e07 -
References () https://git.kernel.org/stable/c/48d443d200237782dc82e6b60663ec414ef02e39 - () https://git.kernel.org/stable/c/48d443d200237782dc82e6b60663ec414ef02e39 -
References () https://git.kernel.org/stable/c/76ffbe911e2798c7296968f5fd72f7bf67207a8d - () https://git.kernel.org/stable/c/76ffbe911e2798c7296968f5fd72f7bf67207a8d -
References () https://git.kernel.org/stable/c/91e4c4595fae5e87069e44687ae879091783c183 - () https://git.kernel.org/stable/c/91e4c4595fae5e87069e44687ae879091783c183 -
References () https://git.kernel.org/stable/c/ca581d237f3b8539c044205bb003de71d75d227c - () https://git.kernel.org/stable/c/ca581d237f3b8539c044205bb003de71d75d227c -
References () https://git.kernel.org/stable/c/f0fe7ad5aff4f0fcf988913313c497de85f1e186 - () https://git.kernel.org/stable/c/f0fe7ad5aff4f0fcf988913313c497de85f1e186 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: nilfs2: previene el error del kernel en submit_bh_wbc(). Se corrige un error por el cual nilfs_get_block() devuelve un estado exitoso cuando la búsqueda y la inserción del bloque especificado fallan de manera inconsistente. Si este comportamiento inconsistente no se debe a un error solucionado previamente, entonces se está produciendo una ejecución inesperada, por lo que se devuelve un error temporal -EAGAIN. Esto evita que llamadores como __block_write_begin_int() soliciten una lectura en un búfer que no está asignado, lo que provocaría que falle la verificación BUG_ON del indicador BH_Mapped en submit_bh_wbc().

01 May 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 06:15

Updated : 2025-12-23 00:59


NVD link : CVE-2024-26955

Mitre link : CVE-2024-26955

CVE.ORG link : CVE-2024-26955


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel