cve-2024-49958
Vulnerability from cvelistv5
Published
2024-10-21 18:02
Modified
2024-12-19 09:30
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: ocfs2: reserve space for inline xattr before attaching reflink tree One of our customers reported a crash and a corrupted ocfs2 filesystem. The crash was due to the detection of corruption. Upon troubleshooting, the fsck -fn output showed the below corruption [EXTENT_LIST_FREE] Extent list in owner 33080590 claims 230 as the next free chain record, but fsck believes the largest valid value is 227. Clamp the next record value? n The stat output from the debugfs.ocfs2 showed the following corruption where the "Next Free Rec:" had overshot the "Count:" in the root metadata block. Inode: 33080590 Mode: 0640 Generation: 2619713622 (0x9c25a856) FS Generation: 904309833 (0x35e6ac49) CRC32: 00000000 ECC: 0000 Type: Regular Attr: 0x0 Flags: Valid Dynamic Features: (0x16) HasXattr InlineXattr Refcounted Extended Attributes Block: 0 Extended Attributes Inline Size: 256 User: 0 (root) Group: 0 (root) Size: 281320357888 Links: 1 Clusters: 141738 ctime: 0x66911b56 0x316edcb8 -- Fri Jul 12 06:02:30.829349048 2024 atime: 0x66911d6b 0x7f7a28d -- Fri Jul 12 06:11:23.133669517 2024 mtime: 0x66911b56 0x12ed75d7 -- Fri Jul 12 06:02:30.317552087 2024 dtime: 0x0 -- Wed Dec 31 17:00:00 1969 Refcount Block: 2777346 Last Extblk: 2886943 Orphan Slot: 0 Sub Alloc Slot: 0 Sub Alloc Bit: 14 Tree Depth: 1 Count: 227 Next Free Rec: 230 ## Offset Clusters Block# 0 0 2310 2776351 1 2310 2139 2777375 2 4449 1221 2778399 3 5670 731 2779423 4 6401 566 2780447 ....... .... ....... ....... .... ....... The issue was in the reflink workfow while reserving space for inline xattr. The problematic function is ocfs2_reflink_xattr_inline(). By the time this function is called the reflink tree is already recreated at the destination inode from the source inode. At this point, this function reserves space for inline xattrs at the destination inode without even checking if there is space at the root metadata block. It simply reduces the l_count from 243 to 227 thereby making space of 256 bytes for inline xattr whereas the inode already has extents beyond this index (in this case up to 230), thereby causing corruption. The fix for this is to reserve space for inline metadata at the destination inode before the reflink tree gets recreated. The customer has verified the fix.
Impacted products
Vendor Product Version
Linux Linux Version: ef962df057aaafd714f5c22ba3de1be459571fdf
Version: ef962df057aaafd714f5c22ba3de1be459571fdf
Version: ef962df057aaafd714f5c22ba3de1be459571fdf
Version: ef962df057aaafd714f5c22ba3de1be459571fdf
Version: ef962df057aaafd714f5c22ba3de1be459571fdf
Version: ef962df057aaafd714f5c22ba3de1be459571fdf
Version: ef962df057aaafd714f5c22ba3de1be459571fdf
Version: ef962df057aaafd714f5c22ba3de1be459571fdf
Version: ef962df057aaafd714f5c22ba3de1be459571fdf
Create a notification for this product.
   Linux Linux Version: 3.11
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-49958",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T13:35:29.206736Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T13:38:48.118Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/ocfs2/refcounttree.c",
            "fs/ocfs2/xattr.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "5c9807c523b4fca81d3e8e864dabc8c806402121",
              "status": "affected",
              "version": "ef962df057aaafd714f5c22ba3de1be459571fdf",
              "versionType": "git"
            },
            {
              "lessThan": "74364cb578dcc0b6c9109519d19cbe5a56afac9a",
              "status": "affected",
              "version": "ef962df057aaafd714f5c22ba3de1be459571fdf",
              "versionType": "git"
            },
            {
              "lessThan": "aac31d654a0a31cb0d2fa36ae694f4e164a52707",
              "status": "affected",
              "version": "ef962df057aaafd714f5c22ba3de1be459571fdf",
              "versionType": "git"
            },
            {
              "lessThan": "020f5c53c17f66c0a8f2d37dad27ace301b8d8a1",
              "status": "affected",
              "version": "ef962df057aaafd714f5c22ba3de1be459571fdf",
              "versionType": "git"
            },
            {
              "lessThan": "5c2072f02c0d75802ec28ec703b7d43a0dd008b5",
              "status": "affected",
              "version": "ef962df057aaafd714f5c22ba3de1be459571fdf",
              "versionType": "git"
            },
            {
              "lessThan": "637c00e06564a945e9d0edb3d78d362d64935f9f",
              "status": "affected",
              "version": "ef962df057aaafd714f5c22ba3de1be459571fdf",
              "versionType": "git"
            },
            {
              "lessThan": "9f9a8f3ac65b4147f1a7b6c05fad5192c0e3c3d9",
              "status": "affected",
              "version": "ef962df057aaafd714f5c22ba3de1be459571fdf",
              "versionType": "git"
            },
            {
              "lessThan": "96ce4c3537114d1698be635f5e36c62dc49df7a4",
              "status": "affected",
              "version": "ef962df057aaafd714f5c22ba3de1be459571fdf",
              "versionType": "git"
            },
            {
              "lessThan": "5ca60b86f57a4d9648f68418a725b3a7de2816b0",
              "status": "affected",
              "version": "ef962df057aaafd714f5c22ba3de1be459571fdf",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/ocfs2/refcounttree.c",
            "fs/ocfs2/xattr.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.11"
            },
            {
              "lessThan": "3.11",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.323",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.285",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.227",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.168",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.113",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.55",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.14",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.12",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: reserve space for inline xattr before attaching reflink tree\n\nOne of our customers reported a crash and a corrupted ocfs2 filesystem. \nThe crash was due to the detection of corruption.  Upon troubleshooting,\nthe fsck -fn output showed the below corruption\n\n[EXTENT_LIST_FREE] Extent list in owner 33080590 claims 230 as the next free chain record,\nbut fsck believes the largest valid value is 227.  Clamp the next record value? n\n\nThe stat output from the debugfs.ocfs2 showed the following corruption\nwhere the \"Next Free Rec:\" had overshot the \"Count:\" in the root metadata\nblock.\n\n        Inode: 33080590   Mode: 0640   Generation: 2619713622 (0x9c25a856)\n        FS Generation: 904309833 (0x35e6ac49)\n        CRC32: 00000000   ECC: 0000\n        Type: Regular   Attr: 0x0   Flags: Valid\n        Dynamic Features: (0x16) HasXattr InlineXattr Refcounted\n        Extended Attributes Block: 0  Extended Attributes Inline Size: 256\n        User: 0 (root)   Group: 0 (root)   Size: 281320357888\n        Links: 1   Clusters: 141738\n        ctime: 0x66911b56 0x316edcb8 -- Fri Jul 12 06:02:30.829349048 2024\n        atime: 0x66911d6b 0x7f7a28d -- Fri Jul 12 06:11:23.133669517 2024\n        mtime: 0x66911b56 0x12ed75d7 -- Fri Jul 12 06:02:30.317552087 2024\n        dtime: 0x0 -- Wed Dec 31 17:00:00 1969\n        Refcount Block: 2777346\n        Last Extblk: 2886943   Orphan Slot: 0\n        Sub Alloc Slot: 0   Sub Alloc Bit: 14\n        Tree Depth: 1   Count: 227   Next Free Rec: 230\n        ## Offset        Clusters       Block#\n        0  0             2310           2776351\n        1  2310          2139           2777375\n        2  4449          1221           2778399\n        3  5670          731            2779423\n        4  6401          566            2780447\n        .......          ....           .......\n        .......          ....           .......\n\nThe issue was in the reflink workfow while reserving space for inline\nxattr.  The problematic function is ocfs2_reflink_xattr_inline().  By the\ntime this function is called the reflink tree is already recreated at the\ndestination inode from the source inode.  At this point, this function\nreserves space for inline xattrs at the destination inode without even\nchecking if there is space at the root metadata block.  It simply reduces\nthe l_count from 243 to 227 thereby making space of 256 bytes for inline\nxattr whereas the inode already has extents beyond this index (in this\ncase up to 230), thereby causing corruption.\n\nThe fix for this is to reserve space for inline metadata at the destination\ninode before the reflink tree gets recreated. The customer has verified the\nfix."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-19T09:30:09.822Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/5c9807c523b4fca81d3e8e864dabc8c806402121"
        },
        {
          "url": "https://git.kernel.org/stable/c/74364cb578dcc0b6c9109519d19cbe5a56afac9a"
        },
        {
          "url": "https://git.kernel.org/stable/c/aac31d654a0a31cb0d2fa36ae694f4e164a52707"
        },
        {
          "url": "https://git.kernel.org/stable/c/020f5c53c17f66c0a8f2d37dad27ace301b8d8a1"
        },
        {
          "url": "https://git.kernel.org/stable/c/5c2072f02c0d75802ec28ec703b7d43a0dd008b5"
        },
        {
          "url": "https://git.kernel.org/stable/c/637c00e06564a945e9d0edb3d78d362d64935f9f"
        },
        {
          "url": "https://git.kernel.org/stable/c/9f9a8f3ac65b4147f1a7b6c05fad5192c0e3c3d9"
        },
        {
          "url": "https://git.kernel.org/stable/c/96ce4c3537114d1698be635f5e36c62dc49df7a4"
        },
        {
          "url": "https://git.kernel.org/stable/c/5ca60b86f57a4d9648f68418a725b3a7de2816b0"
        }
      ],
      "title": "ocfs2: reserve space for inline xattr before attaching reflink tree",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-49958",
    "datePublished": "2024-10-21T18:02:11.702Z",
    "dateReserved": "2024-10-21T12:17:06.048Z",
    "dateUpdated": "2024-12-19T09:30:09.822Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-49958\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T18:15:17.050\",\"lastModified\":\"2024-11-08T16:15:34.497\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nocfs2: reserve space for inline xattr before attaching reflink tree\\n\\nOne of our customers reported a crash and a corrupted ocfs2 filesystem. \\nThe crash was due to the detection of corruption.  Upon troubleshooting,\\nthe fsck -fn output showed the below corruption\\n\\n[EXTENT_LIST_FREE] Extent list in owner 33080590 claims 230 as the next free chain record,\\nbut fsck believes the largest valid value is 227.  Clamp the next record value? n\\n\\nThe stat output from the debugfs.ocfs2 showed the following corruption\\nwhere the \\\"Next Free Rec:\\\" had overshot the \\\"Count:\\\" in the root metadata\\nblock.\\n\\n        Inode: 33080590   Mode: 0640   Generation: 2619713622 (0x9c25a856)\\n        FS Generation: 904309833 (0x35e6ac49)\\n        CRC32: 00000000   ECC: 0000\\n        Type: Regular   Attr: 0x0   Flags: Valid\\n        Dynamic Features: (0x16) HasXattr InlineXattr Refcounted\\n        Extended Attributes Block: 0  Extended Attributes Inline Size: 256\\n        User: 0 (root)   Group: 0 (root)   Size: 281320357888\\n        Links: 1   Clusters: 141738\\n        ctime: 0x66911b56 0x316edcb8 -- Fri Jul 12 06:02:30.829349048 2024\\n        atime: 0x66911d6b 0x7f7a28d -- Fri Jul 12 06:11:23.133669517 2024\\n        mtime: 0x66911b56 0x12ed75d7 -- Fri Jul 12 06:02:30.317552087 2024\\n        dtime: 0x0 -- Wed Dec 31 17:00:00 1969\\n        Refcount Block: 2777346\\n        Last Extblk: 2886943   Orphan Slot: 0\\n        Sub Alloc Slot: 0   Sub Alloc Bit: 14\\n        Tree Depth: 1   Count: 227   Next Free Rec: 230\\n        ## Offset        Clusters       Block#\\n        0  0             2310           2776351\\n        1  2310          2139           2777375\\n        2  4449          1221           2778399\\n        3  5670          731            2779423\\n        4  6401          566            2780447\\n        .......          ....           .......\\n        .......          ....           .......\\n\\nThe issue was in the reflink workfow while reserving space for inline\\nxattr.  The problematic function is ocfs2_reflink_xattr_inline().  By the\\ntime this function is called the reflink tree is already recreated at the\\ndestination inode from the source inode.  At this point, this function\\nreserves space for inline xattrs at the destination inode without even\\nchecking if there is space at the root metadata block.  It simply reduces\\nthe l_count from 243 to 227 thereby making space of 256 bytes for inline\\nxattr whereas the inode already has extents beyond this index (in this\\ncase up to 230), thereby causing corruption.\\n\\nThe fix for this is to reserve space for inline metadata at the destination\\ninode before the reflink tree gets recreated. The customer has verified the\\nfix.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: reserva espacio para xattr en l\u00ednea antes de adjuntar \u00e1rbol reflink Uno de nuestros clientes inform\u00f3 de un fallo y un sistema de archivos ocfs2 da\u00f1ado. El fallo se debi\u00f3 a la detecci\u00f3n de una corrupci\u00f3n. Tras la resoluci\u00f3n de problemas, la salida de fsck -fn mostr\u00f3 la siguiente corrupci\u00f3n [EXTENT_LIST_FREE] La lista de extensiones del propietario 33080590 afirma que 230 es el siguiente registro de cadena libre, pero fsck cree que el valor v\u00e1lido m\u00e1s grande es 227. \u00bfFijar el siguiente valor de registro? n La salida de estad\u00edsticas de debugfs.ocfs2 mostr\u00f3 la siguiente corrupci\u00f3n, donde \\\"Next Free Rec:\\\" hab\u00eda superado \\\"Count:\\\" en el bloque de metadatos ra\u00edz. Inodo: 33080590 Modo: 0640 Generaci\u00f3n: 2619713622 (0x9c25a856) Generaci\u00f3n FS: 904309833 (0x35e6ac49) CRC32: 00000000 ECC: 0000 Tipo: Regular Atributo: 0x0 Indicadores: V\u00e1lido Caracter\u00edsticas din\u00e1micas: (0x16) HasXattr InlineXattr Refcounted Bloque de atributos extendidos: 0 Tama\u00f1o en l\u00ednea de atributos extendidos: 256 Usuario: 0 (ra\u00edz) Grupo: 0 (ra\u00edz) Tama\u00f1o: 281320357888 Enlaces: 1 Cl\u00fasteres: 141738 ctime: 0x66911b56 0x316edcb8 -- Vie Jul 12 06:02:30.829349048 2024 atime: 0x66911d6b 0x7f7a28d -- Vie Jul 12 06:11:23.133669517 2024 mtime: 0x66911b56 0x12ed75d7 -- Vie Jul 12 06:02:30.317552087 2024 dtime: 0x0 -- Mi\u00e9 Dic 31 17:00:00 1969 Refcount Block: 2777346 Last Extblk: 2886943 Orphan Slot: 0 Sub Alloc Slot: 0 Sub Alloc Bit: 14 Tree Depth: 1 Count: 227 Next Free Rec: 230 ## Offset Clusters Block# 0 0 2310 2776351 1 2310 2139 2777375 2 4449 1221 2778399 3 5670 731 2779423 4 6401 566 2780447 ....... .... ....... ....... ....... ....... El problema estaba en el flujo de trabajo de reflink mientras se reservaba espacio para xattr en l\u00ednea. La funci\u00f3n problem\u00e1tica es ocfs2_reflink_xattr_inline(). Para cuando se llama a esta funci\u00f3n, el \u00e1rbol de reflink ya se ha recreado en el inodo de destino a partir del inodo de origen. En este punto, esta funci\u00f3n reserva espacio para xattrs en l\u00ednea en el inodo de destino sin siquiera verificar si hay espacio en el bloque de metadatos ra\u00edz. Simplemente reduce el l_count de 243 a 227, lo que crea un espacio de 256 bytes para xattr en l\u00ednea, mientras que el inodo ya tiene extensiones m\u00e1s all\u00e1 de este \u00edndice (en este caso, hasta 230), lo que provoca corrupci\u00f3n. La soluci\u00f3n para esto es reservar espacio para metadatos en l\u00ednea en el inodo de destino antes de que se vuelva a crear el \u00e1rbol de enlaces de referencia. El cliente ha verificado la soluci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.87\",\"versionEndExcluding\":\"3.2\",\"matchCriteriaId\":\"791E194E-84AF-4095-87F9-9878CF1FB0CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.2.49\",\"versionEndExcluding\":\"3.4\",\"matchCriteriaId\":\"1439A012-0C0E-4645-BAE0-45B65473BD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.4.54\",\"versionEndExcluding\":\"3.9\",\"matchCriteriaId\":\"C5906DC6-202A-47B9-B7BA-4EEF64C01726\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.9.11\",\"versionEndExcluding\":\"3.10\",\"matchCriteriaId\":\"4BD83880-FDD6-4B9B-977F-BE081DFB3E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.10.2\",\"versionEndExcluding\":\"3.11\",\"matchCriteriaId\":\"622187E7-05AC-48EA-B81A-5ACBECB202F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.11\",\"versionEndExcluding\":\"5.10.227\",\"matchCriteriaId\":\"B72C3A38-70DC-4660-8C94-BB0172CE7892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"4D51C05D-455B-4D8D-89E7-A58E140B864C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.55\",\"matchCriteriaId\":\"E90B9576-56C4-47BC-AAB0-C5B2D438F5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.14\",\"matchCriteriaId\":\"4C16BCE0-FFA0-4599-BE0A-1FD65101C021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.3\",\"matchCriteriaId\":\"54D9C704-D679-41A7-9C40-10A6B1E7FFE9\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/020f5c53c17f66c0a8f2d37dad27ace301b8d8a1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5c2072f02c0d75802ec28ec703b7d43a0dd008b5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5c9807c523b4fca81d3e8e864dabc8c806402121\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5ca60b86f57a4d9648f68418a725b3a7de2816b0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/637c00e06564a945e9d0edb3d78d362d64935f9f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/74364cb578dcc0b6c9109519d19cbe5a56afac9a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/96ce4c3537114d1698be635f5e36c62dc49df7a4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9f9a8f3ac65b4147f1a7b6c05fad5192c0e3c3d9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/aac31d654a0a31cb0d2fa36ae694f4e164a52707\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-49958\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-22T13:35:29.206736Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-22T13:35:32.500Z\"}}], \"cna\": {\"title\": \"ocfs2: reserve space for inline xattr before attaching reflink tree\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"ef962df057aaafd714f5c22ba3de1be459571fdf\", \"lessThan\": \"5c9807c523b4fca81d3e8e864dabc8c806402121\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ef962df057aaafd714f5c22ba3de1be459571fdf\", \"lessThan\": \"74364cb578dcc0b6c9109519d19cbe5a56afac9a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ef962df057aaafd714f5c22ba3de1be459571fdf\", \"lessThan\": \"aac31d654a0a31cb0d2fa36ae694f4e164a52707\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ef962df057aaafd714f5c22ba3de1be459571fdf\", \"lessThan\": \"020f5c53c17f66c0a8f2d37dad27ace301b8d8a1\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ef962df057aaafd714f5c22ba3de1be459571fdf\", \"lessThan\": \"5c2072f02c0d75802ec28ec703b7d43a0dd008b5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ef962df057aaafd714f5c22ba3de1be459571fdf\", \"lessThan\": \"637c00e06564a945e9d0edb3d78d362d64935f9f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ef962df057aaafd714f5c22ba3de1be459571fdf\", \"lessThan\": \"9f9a8f3ac65b4147f1a7b6c05fad5192c0e3c3d9\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ef962df057aaafd714f5c22ba3de1be459571fdf\", \"lessThan\": \"96ce4c3537114d1698be635f5e36c62dc49df7a4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ef962df057aaafd714f5c22ba3de1be459571fdf\", \"lessThan\": \"5ca60b86f57a4d9648f68418a725b3a7de2816b0\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/ocfs2/refcounttree.c\", \"fs/ocfs2/xattr.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.11\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.11\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.323\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.285\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.227\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.55\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.14\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/ocfs2/refcounttree.c\", \"fs/ocfs2/xattr.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/5c9807c523b4fca81d3e8e864dabc8c806402121\"}, {\"url\": \"https://git.kernel.org/stable/c/74364cb578dcc0b6c9109519d19cbe5a56afac9a\"}, {\"url\": \"https://git.kernel.org/stable/c/aac31d654a0a31cb0d2fa36ae694f4e164a52707\"}, {\"url\": \"https://git.kernel.org/stable/c/020f5c53c17f66c0a8f2d37dad27ace301b8d8a1\"}, {\"url\": \"https://git.kernel.org/stable/c/5c2072f02c0d75802ec28ec703b7d43a0dd008b5\"}, {\"url\": \"https://git.kernel.org/stable/c/637c00e06564a945e9d0edb3d78d362d64935f9f\"}, {\"url\": \"https://git.kernel.org/stable/c/9f9a8f3ac65b4147f1a7b6c05fad5192c0e3c3d9\"}, {\"url\": \"https://git.kernel.org/stable/c/96ce4c3537114d1698be635f5e36c62dc49df7a4\"}, {\"url\": \"https://git.kernel.org/stable/c/5ca60b86f57a4d9648f68418a725b3a7de2816b0\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nocfs2: reserve space for inline xattr before attaching reflink tree\\n\\nOne of our customers reported a crash and a corrupted ocfs2 filesystem. \\nThe crash was due to the detection of corruption.  Upon troubleshooting,\\nthe fsck -fn output showed the below corruption\\n\\n[EXTENT_LIST_FREE] Extent list in owner 33080590 claims 230 as the next free chain record,\\nbut fsck believes the largest valid value is 227.  Clamp the next record value? n\\n\\nThe stat output from the debugfs.ocfs2 showed the following corruption\\nwhere the \\\"Next Free Rec:\\\" had overshot the \\\"Count:\\\" in the root metadata\\nblock.\\n\\n        Inode: 33080590   Mode: 0640   Generation: 2619713622 (0x9c25a856)\\n        FS Generation: 904309833 (0x35e6ac49)\\n        CRC32: 00000000   ECC: 0000\\n        Type: Regular   Attr: 0x0   Flags: Valid\\n        Dynamic Features: (0x16) HasXattr InlineXattr Refcounted\\n        Extended Attributes Block: 0  Extended Attributes Inline Size: 256\\n        User: 0 (root)   Group: 0 (root)   Size: 281320357888\\n        Links: 1   Clusters: 141738\\n        ctime: 0x66911b56 0x316edcb8 -- Fri Jul 12 06:02:30.829349048 2024\\n        atime: 0x66911d6b 0x7f7a28d -- Fri Jul 12 06:11:23.133669517 2024\\n        mtime: 0x66911b56 0x12ed75d7 -- Fri Jul 12 06:02:30.317552087 2024\\n        dtime: 0x0 -- Wed Dec 31 17:00:00 1969\\n        Refcount Block: 2777346\\n        Last Extblk: 2886943   Orphan Slot: 0\\n        Sub Alloc Slot: 0   Sub Alloc Bit: 14\\n        Tree Depth: 1   Count: 227   Next Free Rec: 230\\n        ## Offset        Clusters       Block#\\n        0  0             2310           2776351\\n        1  2310          2139           2777375\\n        2  4449          1221           2778399\\n        3  5670          731            2779423\\n        4  6401          566            2780447\\n        .......          ....           .......\\n        .......          ....           .......\\n\\nThe issue was in the reflink workfow while reserving space for inline\\nxattr.  The problematic function is ocfs2_reflink_xattr_inline().  By the\\ntime this function is called the reflink tree is already recreated at the\\ndestination inode from the source inode.  At this point, this function\\nreserves space for inline xattrs at the destination inode without even\\nchecking if there is space at the root metadata block.  It simply reduces\\nthe l_count from 243 to 227 thereby making space of 256 bytes for inline\\nxattr whereas the inode already has extents beyond this index (in this\\ncase up to 230), thereby causing corruption.\\n\\nThe fix for this is to reserve space for inline metadata at the destination\\ninode before the reflink tree gets recreated. The customer has verified the\\nfix.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:30:09.822Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-49958\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:30:09.822Z\", \"dateReserved\": \"2024-10-21T12:17:06.048Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T18:02:11.702Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.