cve-2024-47690
Vulnerability from cvelistv5
Published
2024-10-21 11:53
Modified
2024-12-19 09:26
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: f2fs: get rid of online repaire on corrupted directory syzbot reports a f2fs bug as below: kernel BUG at fs/f2fs/inode.c:896! RIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896 Call Trace: evict+0x532/0x950 fs/inode.c:704 dispose_list fs/inode.c:747 [inline] evict_inodes+0x5f9/0x690 fs/inode.c:797 generic_shutdown_super+0x9d/0x2d0 fs/super.c:627 kill_block_super+0x44/0x90 fs/super.c:1696 kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898 deactivate_locked_super+0xc4/0x130 fs/super.c:473 cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373 task_work_run+0x24f/0x310 kernel/task_work.c:228 ptrace_notify+0x2d2/0x380 kernel/signal.c:2402 ptrace_report_syscall include/linux/ptrace.h:415 [inline] ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline] syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173 syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline] syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896 Online repaire on corrupted directory in f2fs_lookup() can generate dirty data/meta while racing w/ readonly remount, it may leave dirty inode after filesystem becomes readonly, however, checkpoint() will skips flushing dirty inode in a state of readonly mode, result in above panic. Let's get rid of online repaire in f2fs_lookup(), and leave the work to fsck.f2fs.
Impacted products
Vendor Product Version
Linux Linux Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Create a notification for this product.
   Linux Linux Version: 4.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-47690",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-21T13:06:03.889382Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-21T13:14:15.315Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "fs/f2fs/f2fs.h",
                  "fs/f2fs/namei.c",
                  "include/linux/f2fs_fs.h",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "e8d64f598eeb079c42a52deaa3a91312c736a49d",
                     status: "affected",
                     version: "510022a85839a8409d1e6a519bb86ce71a84f30a",
                     versionType: "git",
                  },
                  {
                     lessThan: "f4746f2d79507f65cfbde11d3c39ee8338aa50af",
                     status: "affected",
                     version: "510022a85839a8409d1e6a519bb86ce71a84f30a",
                     versionType: "git",
                  },
                  {
                     lessThan: "f9ce2f550d53d044ecfb5ce996406cf42cd6b84d",
                     status: "affected",
                     version: "510022a85839a8409d1e6a519bb86ce71a84f30a",
                     versionType: "git",
                  },
                  {
                     lessThan: "8be95cd607478d85fa4626e86f811e785905bcbf",
                     status: "affected",
                     version: "510022a85839a8409d1e6a519bb86ce71a84f30a",
                     versionType: "git",
                  },
                  {
                     lessThan: "bcefd0b0611f35b560d0a7281d87529fbe7a1e32",
                     status: "affected",
                     version: "510022a85839a8409d1e6a519bb86ce71a84f30a",
                     versionType: "git",
                  },
                  {
                     lessThan: "884ee6dc85b959bc152f15bca80c30f06069e6c4",
                     status: "affected",
                     version: "510022a85839a8409d1e6a519bb86ce71a84f30a",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "fs/f2fs/f2fs.h",
                  "fs/f2fs/namei.c",
                  "include/linux/f2fs_fs.h",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "4.1",
                  },
                  {
                     lessThan: "4.1",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.15.*",
                     status: "unaffected",
                     version: "5.15.168",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.113",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.54",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.10.*",
                     status: "unaffected",
                     version: "6.10.13",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.11.*",
                     status: "unaffected",
                     version: "6.11.2",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.12",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: get rid of online repaire on corrupted directory\n\nsyzbot reports a f2fs bug as below:\n\nkernel BUG at fs/f2fs/inode.c:896!\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\nCall Trace:\n evict+0x532/0x950 fs/inode.c:704\n dispose_list fs/inode.c:747 [inline]\n evict_inodes+0x5f9/0x690 fs/inode.c:797\n generic_shutdown_super+0x9d/0x2d0 fs/super.c:627\n kill_block_super+0x44/0x90 fs/super.c:1696\n kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898\n deactivate_locked_super+0xc4/0x130 fs/super.c:473\n cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373\n task_work_run+0x24f/0x310 kernel/task_work.c:228\n ptrace_notify+0x2d2/0x380 kernel/signal.c:2402\n ptrace_report_syscall include/linux/ptrace.h:415 [inline]\n ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline]\n syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173\n syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline]\n __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline]\n syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218\n do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\n\nOnline repaire on corrupted directory in f2fs_lookup() can generate\ndirty data/meta while racing w/ readonly remount, it may leave dirty\ninode after filesystem becomes readonly, however, checkpoint() will\nskips flushing dirty inode in a state of readonly mode, result in\nabove panic.\n\nLet's get rid of online repaire in f2fs_lookup(), and leave the work\nto fsck.f2fs.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T09:26:09.544Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/e8d64f598eeb079c42a52deaa3a91312c736a49d",
            },
            {
               url: "https://git.kernel.org/stable/c/f4746f2d79507f65cfbde11d3c39ee8338aa50af",
            },
            {
               url: "https://git.kernel.org/stable/c/f9ce2f550d53d044ecfb5ce996406cf42cd6b84d",
            },
            {
               url: "https://git.kernel.org/stable/c/8be95cd607478d85fa4626e86f811e785905bcbf",
            },
            {
               url: "https://git.kernel.org/stable/c/bcefd0b0611f35b560d0a7281d87529fbe7a1e32",
            },
            {
               url: "https://git.kernel.org/stable/c/884ee6dc85b959bc152f15bca80c30f06069e6c4",
            },
         ],
         title: "f2fs: get rid of online repaire on corrupted directory",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-47690",
      datePublished: "2024-10-21T11:53:29.870Z",
      dateReserved: "2024-09-30T16:00:12.942Z",
      dateUpdated: "2024-12-19T09:26:09.544Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-47690\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T12:15:05.800\",\"lastModified\":\"2024-10-23T21:25:11.673\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: get rid of online repaire on corrupted directory\\n\\nsyzbot reports a f2fs bug as below:\\n\\nkernel BUG at fs/f2fs/inode.c:896!\\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\\nCall Trace:\\n evict+0x532/0x950 fs/inode.c:704\\n dispose_list fs/inode.c:747 [inline]\\n evict_inodes+0x5f9/0x690 fs/inode.c:797\\n generic_shutdown_super+0x9d/0x2d0 fs/super.c:627\\n kill_block_super+0x44/0x90 fs/super.c:1696\\n kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898\\n deactivate_locked_super+0xc4/0x130 fs/super.c:473\\n cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373\\n task_work_run+0x24f/0x310 kernel/task_work.c:228\\n ptrace_notify+0x2d2/0x380 kernel/signal.c:2402\\n ptrace_report_syscall include/linux/ptrace.h:415 [inline]\\n ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline]\\n syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173\\n syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline]\\n __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline]\\n syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218\\n do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89\\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\\n\\nOnline repaire on corrupted directory in f2fs_lookup() can generate\\ndirty data/meta while racing w/ readonly remount, it may leave dirty\\ninode after filesystem becomes readonly, however, checkpoint() will\\nskips flushing dirty inode in a state of readonly mode, result in\\nabove panic.\\n\\nLet's get rid of online repaire in f2fs_lookup(), and leave the work\\nto fsck.f2fs.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: deshacerse de la reparación en línea en un directorio dañado syzbot informa un error de f2fs como el siguiente: ¡ERROR del kernel en fs/f2fs/inode.c:896! RIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896 Seguimiento de llamadas: evict+0x532/0x950 fs/inode.c:704 dispose_list fs/inode.c:747 [en línea] evict_inodes+0x5f9/0x690 fs/inode.c:797 generic_shutdown_super+0x9d/0x2d0 fs/super.c:627 kill_block_super+0x44/0x90 fs/super.c:1696 kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898 deactivate_locked_super+0xc4/0x130 fs/super.c:473 cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373 task_work_run+0x24f/0x310 kernel/task_work.c:228 ptrace_notify+0x2d2/0x380 kernel/signal.c:2402 ptrace_report_syscall include/linux/ptrace.h:415 [en línea] ptrace_report_syscall_exit include/linux/ptrace.h:477 [en línea] syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173 syscall_salir_a_modo_usuario_prepare kernel/entry/common.c:200 [en línea] __syscall_salir_a_modo_usuario_work kernel/entry/common.c:205 [en línea] syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896 La reparación en línea en un directorio dañado en f2fs_lookup() puede generar datos/meta sucios mientras se corre con el remontaje de solo lectura, puede dejar un inodo sucio después de que el sistema de archivos se vuelva de solo lectura, sin embargo, checkpoint() omitirá la limpieza del inodo sucio en un estado de modo de solo lectura, lo que dará como resultado el pánico mencionado anteriormente. Deshagámonos de la reparación en línea en f2fs_lookup() y dejemos el trabajo a fsck.f2fs.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"EAD5095E-29F5-4D9A-8FED-5082AD0A8A01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.54\",\"matchCriteriaId\":\"D448821D-C085-4CAF-88FA-2DDE7BE21976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.13\",\"matchCriteriaId\":\"CE94BB8D-B0AB-4563-9ED7-A12122B56EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.2\",\"matchCriteriaId\":\"AB755D26-97F4-43B6-8604-CD076811E181\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/884ee6dc85b959bc152f15bca80c30f06069e6c4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8be95cd607478d85fa4626e86f811e785905bcbf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/bcefd0b0611f35b560d0a7281d87529fbe7a1e32\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e8d64f598eeb079c42a52deaa3a91312c736a49d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f4746f2d79507f65cfbde11d3c39ee8338aa50af\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f9ce2f550d53d044ecfb5ce996406cf42cd6b84d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47690\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-21T13:06:03.889382Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-21T13:06:07.093Z\"}}], \"cna\": {\"title\": \"f2fs: get rid of online repaire on corrupted directory\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"e8d64f598eeb079c42a52deaa3a91312c736a49d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"f4746f2d79507f65cfbde11d3c39ee8338aa50af\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"f9ce2f550d53d044ecfb5ce996406cf42cd6b84d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"8be95cd607478d85fa4626e86f811e785905bcbf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"bcefd0b0611f35b560d0a7281d87529fbe7a1e32\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"884ee6dc85b959bc152f15bca80c30f06069e6c4\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/f2fs/f2fs.h\", \"fs/f2fs/namei.c\", \"include/linux/f2fs_fs.h\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.1\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.1\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.54\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.13\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/f2fs/f2fs.h\", \"fs/f2fs/namei.c\", \"include/linux/f2fs_fs.h\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e8d64f598eeb079c42a52deaa3a91312c736a49d\"}, {\"url\": \"https://git.kernel.org/stable/c/f4746f2d79507f65cfbde11d3c39ee8338aa50af\"}, {\"url\": \"https://git.kernel.org/stable/c/f9ce2f550d53d044ecfb5ce996406cf42cd6b84d\"}, {\"url\": \"https://git.kernel.org/stable/c/8be95cd607478d85fa4626e86f811e785905bcbf\"}, {\"url\": \"https://git.kernel.org/stable/c/bcefd0b0611f35b560d0a7281d87529fbe7a1e32\"}, {\"url\": \"https://git.kernel.org/stable/c/884ee6dc85b959bc152f15bca80c30f06069e6c4\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: get rid of online repaire on corrupted directory\\n\\nsyzbot reports a f2fs bug as below:\\n\\nkernel BUG at fs/f2fs/inode.c:896!\\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\\nCall Trace:\\n evict+0x532/0x950 fs/inode.c:704\\n dispose_list fs/inode.c:747 [inline]\\n evict_inodes+0x5f9/0x690 fs/inode.c:797\\n generic_shutdown_super+0x9d/0x2d0 fs/super.c:627\\n kill_block_super+0x44/0x90 fs/super.c:1696\\n kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898\\n deactivate_locked_super+0xc4/0x130 fs/super.c:473\\n cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373\\n task_work_run+0x24f/0x310 kernel/task_work.c:228\\n ptrace_notify+0x2d2/0x380 kernel/signal.c:2402\\n ptrace_report_syscall include/linux/ptrace.h:415 [inline]\\n ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline]\\n syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173\\n syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline]\\n __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline]\\n syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218\\n do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89\\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\\n\\nOnline repaire on corrupted directory in f2fs_lookup() can generate\\ndirty data/meta while racing w/ readonly remount, it may leave dirty\\ninode after filesystem becomes readonly, however, checkpoint() will\\nskips flushing dirty inode in a state of readonly mode, result in\\nabove panic.\\n\\nLet's get rid of online repaire in f2fs_lookup(), and leave the work\\nto fsck.f2fs.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:26:09.544Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-47690\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:26:09.544Z\", \"dateReserved\": \"2024-09-30T16:00:12.942Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T11:53:29.870Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.