CVE-2024-26601

In the Linux kernel, the following vulnerability has been resolved: ext4: regenerate buddy after block freeing failed if under fc replay This mostly reverts commit 6bd97bf273bd ("ext4: remove redundant mb_regenerate_buddy()") and reintroduces mb_regenerate_buddy(). Based on code in mb_free_blocks(), fast commit replay can end up marking as free blocks that are already marked as such. This causes corruption of the buddy bitmap so we need to regenerate it in that case.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:02

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/6b0d48647935e4b8c7b75d1eccb9043fcd4ee581 - Patch () https://git.kernel.org/stable/c/6b0d48647935e4b8c7b75d1eccb9043fcd4ee581 - Patch
References () https://git.kernel.org/stable/c/78327acd4cdc4a1601af718b781eece577b6b7d4 - Patch () https://git.kernel.org/stable/c/78327acd4cdc4a1601af718b781eece577b6b7d4 - Patch
References () https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a - Patch () https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a - Patch
References () https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326 - Patch () https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326 - Patch
References () https://git.kernel.org/stable/c/c9b528c35795b711331ed36dc3dbee90d5812d4e - Patch () https://git.kernel.org/stable/c/c9b528c35795b711331ed36dc3dbee90d5812d4e - Patch
References () https://git.kernel.org/stable/c/ea42d6cffb0dd27a417f410b9d0011e9859328cb - Patch () https://git.kernel.org/stable/c/ea42d6cffb0dd27a417f410b9d0011e9859328cb - Patch

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

17 Apr 2024, 18:03

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/6b0d48647935e4b8c7b75d1eccb9043fcd4ee581 - () https://git.kernel.org/stable/c/6b0d48647935e4b8c7b75d1eccb9043fcd4ee581 - Patch
References () https://git.kernel.org/stable/c/78327acd4cdc4a1601af718b781eece577b6b7d4 - () https://git.kernel.org/stable/c/78327acd4cdc4a1601af718b781eece577b6b7d4 - Patch
References () https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a - () https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a - Patch
References () https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326 - () https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326 - Patch
References () https://git.kernel.org/stable/c/c9b528c35795b711331ed36dc3dbee90d5812d4e - () https://git.kernel.org/stable/c/c9b528c35795b711331ed36dc3dbee90d5812d4e - Patch
References () https://git.kernel.org/stable/c/ea42d6cffb0dd27a417f410b9d0011e9859328cb - () https://git.kernel.org/stable/c/ea42d6cffb0dd27a417f410b9d0011e9859328cb - Patch

01 Mar 2024, 14:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a -
  • () https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326 -

26 Feb 2024, 16:32

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-26 16:27

Updated : 2024-11-21 09:02


NVD link : CVE-2024-26601

Mitre link : CVE-2024-26601

CVE.ORG link : CVE-2024-26601


JSON object : View

Products Affected

linux

  • linux_kernel