cve-2024-47690
Vulnerability from cvelistv5
Published
2024-10-21 11:53
Modified
2024-12-19 09:26
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: f2fs: get rid of online repaire on corrupted directory syzbot reports a f2fs bug as below: kernel BUG at fs/f2fs/inode.c:896! RIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896 Call Trace: evict+0x532/0x950 fs/inode.c:704 dispose_list fs/inode.c:747 [inline] evict_inodes+0x5f9/0x690 fs/inode.c:797 generic_shutdown_super+0x9d/0x2d0 fs/super.c:627 kill_block_super+0x44/0x90 fs/super.c:1696 kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898 deactivate_locked_super+0xc4/0x130 fs/super.c:473 cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373 task_work_run+0x24f/0x310 kernel/task_work.c:228 ptrace_notify+0x2d2/0x380 kernel/signal.c:2402 ptrace_report_syscall include/linux/ptrace.h:415 [inline] ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline] syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173 syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline] syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896 Online repaire on corrupted directory in f2fs_lookup() can generate dirty data/meta while racing w/ readonly remount, it may leave dirty inode after filesystem becomes readonly, however, checkpoint() will skips flushing dirty inode in a state of readonly mode, result in above panic. Let's get rid of online repaire in f2fs_lookup(), and leave the work to fsck.f2fs.
Impacted products
Vendor Product Version
Linux Linux Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Version: 510022a85839a8409d1e6a519bb86ce71a84f30a
Create a notification for this product.
   Linux Linux Version: 4.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-47690",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-21T13:06:03.889382Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T13:14:15.315Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/f2fs/f2fs.h",
            "fs/f2fs/namei.c",
            "include/linux/f2fs_fs.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "e8d64f598eeb079c42a52deaa3a91312c736a49d",
              "status": "affected",
              "version": "510022a85839a8409d1e6a519bb86ce71a84f30a",
              "versionType": "git"
            },
            {
              "lessThan": "f4746f2d79507f65cfbde11d3c39ee8338aa50af",
              "status": "affected",
              "version": "510022a85839a8409d1e6a519bb86ce71a84f30a",
              "versionType": "git"
            },
            {
              "lessThan": "f9ce2f550d53d044ecfb5ce996406cf42cd6b84d",
              "status": "affected",
              "version": "510022a85839a8409d1e6a519bb86ce71a84f30a",
              "versionType": "git"
            },
            {
              "lessThan": "8be95cd607478d85fa4626e86f811e785905bcbf",
              "status": "affected",
              "version": "510022a85839a8409d1e6a519bb86ce71a84f30a",
              "versionType": "git"
            },
            {
              "lessThan": "bcefd0b0611f35b560d0a7281d87529fbe7a1e32",
              "status": "affected",
              "version": "510022a85839a8409d1e6a519bb86ce71a84f30a",
              "versionType": "git"
            },
            {
              "lessThan": "884ee6dc85b959bc152f15bca80c30f06069e6c4",
              "status": "affected",
              "version": "510022a85839a8409d1e6a519bb86ce71a84f30a",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/f2fs/f2fs.h",
            "fs/f2fs/namei.c",
            "include/linux/f2fs_fs.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.1"
            },
            {
              "lessThan": "4.1",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.168",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.113",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.54",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.12",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: get rid of online repaire on corrupted directory\n\nsyzbot reports a f2fs bug as below:\n\nkernel BUG at fs/f2fs/inode.c:896!\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\nCall Trace:\n evict+0x532/0x950 fs/inode.c:704\n dispose_list fs/inode.c:747 [inline]\n evict_inodes+0x5f9/0x690 fs/inode.c:797\n generic_shutdown_super+0x9d/0x2d0 fs/super.c:627\n kill_block_super+0x44/0x90 fs/super.c:1696\n kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898\n deactivate_locked_super+0xc4/0x130 fs/super.c:473\n cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373\n task_work_run+0x24f/0x310 kernel/task_work.c:228\n ptrace_notify+0x2d2/0x380 kernel/signal.c:2402\n ptrace_report_syscall include/linux/ptrace.h:415 [inline]\n ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline]\n syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173\n syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline]\n __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline]\n syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218\n do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\n\nOnline repaire on corrupted directory in f2fs_lookup() can generate\ndirty data/meta while racing w/ readonly remount, it may leave dirty\ninode after filesystem becomes readonly, however, checkpoint() will\nskips flushing dirty inode in a state of readonly mode, result in\nabove panic.\n\nLet\u0027s get rid of online repaire in f2fs_lookup(), and leave the work\nto fsck.f2fs."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:26:09.544Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/e8d64f598eeb079c42a52deaa3a91312c736a49d"
        },
        {
          "url": "https://git.kernel.org/stable/c/f4746f2d79507f65cfbde11d3c39ee8338aa50af"
        },
        {
          "url": "https://git.kernel.org/stable/c/f9ce2f550d53d044ecfb5ce996406cf42cd6b84d"
        },
        {
          "url": "https://git.kernel.org/stable/c/8be95cd607478d85fa4626e86f811e785905bcbf"
        },
        {
          "url": "https://git.kernel.org/stable/c/bcefd0b0611f35b560d0a7281d87529fbe7a1e32"
        },
        {
          "url": "https://git.kernel.org/stable/c/884ee6dc85b959bc152f15bca80c30f06069e6c4"
        }
      ],
      "title": "f2fs: get rid of online repaire on corrupted directory",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-47690",
    "datePublished": "2024-10-21T11:53:29.870Z",
    "dateReserved": "2024-09-30T16:00:12.942Z",
    "dateUpdated": "2024-12-19T09:26:09.544Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-47690\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T12:15:05.800\",\"lastModified\":\"2024-10-23T21:25:11.673\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: get rid of online repaire on corrupted directory\\n\\nsyzbot reports a f2fs bug as below:\\n\\nkernel BUG at fs/f2fs/inode.c:896!\\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\\nCall Trace:\\n evict+0x532/0x950 fs/inode.c:704\\n dispose_list fs/inode.c:747 [inline]\\n evict_inodes+0x5f9/0x690 fs/inode.c:797\\n generic_shutdown_super+0x9d/0x2d0 fs/super.c:627\\n kill_block_super+0x44/0x90 fs/super.c:1696\\n kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898\\n deactivate_locked_super+0xc4/0x130 fs/super.c:473\\n cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373\\n task_work_run+0x24f/0x310 kernel/task_work.c:228\\n ptrace_notify+0x2d2/0x380 kernel/signal.c:2402\\n ptrace_report_syscall include/linux/ptrace.h:415 [inline]\\n ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline]\\n syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173\\n syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline]\\n __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline]\\n syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218\\n do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89\\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\\n\\nOnline repaire on corrupted directory in f2fs_lookup() can generate\\ndirty data/meta while racing w/ readonly remount, it may leave dirty\\ninode after filesystem becomes readonly, however, checkpoint() will\\nskips flushing dirty inode in a state of readonly mode, result in\\nabove panic.\\n\\nLet\u0027s get rid of online repaire in f2fs_lookup(), and leave the work\\nto fsck.f2fs.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: deshacerse de la reparaci\u00f3n en l\u00ednea en un directorio da\u00f1ado syzbot informa un error de f2fs como el siguiente: \u00a1ERROR del kernel en fs/f2fs/inode.c:896! RIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896 Seguimiento de llamadas: evict+0x532/0x950 fs/inode.c:704 dispose_list fs/inode.c:747 [en l\u00ednea] evict_inodes+0x5f9/0x690 fs/inode.c:797 generic_shutdown_super+0x9d/0x2d0 fs/super.c:627 kill_block_super+0x44/0x90 fs/super.c:1696 kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898 deactivate_locked_super+0xc4/0x130 fs/super.c:473 cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373 task_work_run+0x24f/0x310 kernel/task_work.c:228 ptrace_notify+0x2d2/0x380 kernel/signal.c:2402 ptrace_report_syscall include/linux/ptrace.h:415 [en l\u00ednea] ptrace_report_syscall_exit include/linux/ptrace.h:477 [en l\u00ednea] syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173 syscall_salir_a_modo_usuario_prepare kernel/entry/common.c:200 [en l\u00ednea] __syscall_salir_a_modo_usuario_work kernel/entry/common.c:205 [en l\u00ednea] syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896 La reparaci\u00f3n en l\u00ednea en un directorio da\u00f1ado en f2fs_lookup() puede generar datos/meta sucios mientras se corre con el remontaje de solo lectura, puede dejar un inodo sucio despu\u00e9s de que el sistema de archivos se vuelva de solo lectura, sin embargo, checkpoint() omitir\u00e1 la limpieza del inodo sucio en un estado de modo de solo lectura, lo que dar\u00e1 como resultado el p\u00e1nico mencionado anteriormente. Deshag\u00e1monos de la reparaci\u00f3n en l\u00ednea en f2fs_lookup() y dejemos el trabajo a fsck.f2fs.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"EAD5095E-29F5-4D9A-8FED-5082AD0A8A01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.54\",\"matchCriteriaId\":\"D448821D-C085-4CAF-88FA-2DDE7BE21976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.13\",\"matchCriteriaId\":\"CE94BB8D-B0AB-4563-9ED7-A12122B56EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.2\",\"matchCriteriaId\":\"AB755D26-97F4-43B6-8604-CD076811E181\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/884ee6dc85b959bc152f15bca80c30f06069e6c4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8be95cd607478d85fa4626e86f811e785905bcbf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/bcefd0b0611f35b560d0a7281d87529fbe7a1e32\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e8d64f598eeb079c42a52deaa3a91312c736a49d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f4746f2d79507f65cfbde11d3c39ee8338aa50af\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f9ce2f550d53d044ecfb5ce996406cf42cd6b84d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47690\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-21T13:06:03.889382Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-21T13:06:07.093Z\"}}], \"cna\": {\"title\": \"f2fs: get rid of online repaire on corrupted directory\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"e8d64f598eeb079c42a52deaa3a91312c736a49d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"f4746f2d79507f65cfbde11d3c39ee8338aa50af\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"f9ce2f550d53d044ecfb5ce996406cf42cd6b84d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"8be95cd607478d85fa4626e86f811e785905bcbf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"bcefd0b0611f35b560d0a7281d87529fbe7a1e32\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"510022a85839a8409d1e6a519bb86ce71a84f30a\", \"lessThan\": \"884ee6dc85b959bc152f15bca80c30f06069e6c4\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/f2fs/f2fs.h\", \"fs/f2fs/namei.c\", \"include/linux/f2fs_fs.h\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.1\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.1\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.54\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.13\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/f2fs/f2fs.h\", \"fs/f2fs/namei.c\", \"include/linux/f2fs_fs.h\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e8d64f598eeb079c42a52deaa3a91312c736a49d\"}, {\"url\": \"https://git.kernel.org/stable/c/f4746f2d79507f65cfbde11d3c39ee8338aa50af\"}, {\"url\": \"https://git.kernel.org/stable/c/f9ce2f550d53d044ecfb5ce996406cf42cd6b84d\"}, {\"url\": \"https://git.kernel.org/stable/c/8be95cd607478d85fa4626e86f811e785905bcbf\"}, {\"url\": \"https://git.kernel.org/stable/c/bcefd0b0611f35b560d0a7281d87529fbe7a1e32\"}, {\"url\": \"https://git.kernel.org/stable/c/884ee6dc85b959bc152f15bca80c30f06069e6c4\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: get rid of online repaire on corrupted directory\\n\\nsyzbot reports a f2fs bug as below:\\n\\nkernel BUG at fs/f2fs/inode.c:896!\\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\\nCall Trace:\\n evict+0x532/0x950 fs/inode.c:704\\n dispose_list fs/inode.c:747 [inline]\\n evict_inodes+0x5f9/0x690 fs/inode.c:797\\n generic_shutdown_super+0x9d/0x2d0 fs/super.c:627\\n kill_block_super+0x44/0x90 fs/super.c:1696\\n kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898\\n deactivate_locked_super+0xc4/0x130 fs/super.c:473\\n cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373\\n task_work_run+0x24f/0x310 kernel/task_work.c:228\\n ptrace_notify+0x2d2/0x380 kernel/signal.c:2402\\n ptrace_report_syscall include/linux/ptrace.h:415 [inline]\\n ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline]\\n syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173\\n syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline]\\n __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline]\\n syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218\\n do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89\\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\\nRIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896\\n\\nOnline repaire on corrupted directory in f2fs_lookup() can generate\\ndirty data/meta while racing w/ readonly remount, it may leave dirty\\ninode after filesystem becomes readonly, however, checkpoint() will\\nskips flushing dirty inode in a state of readonly mode, result in\\nabove panic.\\n\\nLet\u0027s get rid of online repaire in f2fs_lookup(), and leave the work\\nto fsck.f2fs.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:26:09.544Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-47690\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:26:09.544Z\", \"dateReserved\": \"2024-09-30T16:00:12.942Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T11:53:29.870Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.