Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() Determine if the group block bitmap is corrupted before using ac_b_ex in ext4_mb_try_best_found() to avoid allocating blocks from a group with a corrupted block bitmap in the following concurrency and making the situation worse. ext4_mb_regular_allocator ext4_lock_group(sb, group) ext4_mb_good_group // check if the group bbitmap is corrupted ext4_mb_complex_scan_group // Scan group gets ac_b_ex but doesn't use it ext4_unlock_group(sb, group) ext4_mark_group_bitmap_corrupted(group) // The block bitmap was corrupted during // the group unlock gap. ext4_mb_try_best_found ext4_lock_group(ac->ac_sb, group) ext4_mb_use_best_found mb_mark_used // Allocating blocks in block bitmap corrupted group
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 4.19.308 |
| Debian | Debian Linux | 10.0 |
References
- https://git.kernel.org/stable/c/0184747b552d6b5a14db3b7fcc3b792ce64dedd1Patch
- https://git.kernel.org/stable/c/21f8cfe79f776287459343e9cfa6055af61328eaPatch
- https://git.kernel.org/stable/c/260fc96283c0f594de18a1b045faf6d8fb42874dPatch
- https://git.kernel.org/stable/c/4530b3660d396a646aad91a787b6ab37cf604b53Patch
- https://git.kernel.org/stable/c/4c21fa60a6f4606f6214a38f50612b17b2f738f5Patch
- https://git.kernel.org/stable/c/927794a02169778c9c2e7b25c768ab3ea8c1dc03Patch
- https://git.kernel.org/stable/c/a2576ae9a35c078e488f2c573e9e6821d651fbbePatch
- https://git.kernel.org/stable/c/f97e75fa4e12b0aa0224e83fcbda8853ac2adf36Patch
- https://git.kernel.org/stable/c/0184747b552d6b5a14db3b7fcc3b792ce64dedd1Patch
- https://git.kernel.org/stable/c/21f8cfe79f776287459343e9cfa6055af61328eaPatch
- https://git.kernel.org/stable/c/260fc96283c0f594de18a1b045faf6d8fb42874dPatch
- https://git.kernel.org/stable/c/4530b3660d396a646aad91a787b6ab37cf604b53Patch
- https://git.kernel.org/stable/c/4c21fa60a6f4606f6214a38f50612b17b2f738f5Patch
- https://git.kernel.org/stable/c/927794a02169778c9c2e7b25c768ab3ea8c1dc03Patch
- https://git.kernel.org/stable/c/a2576ae9a35c078e488f2c573e9e6821d651fbbePatch
FAQ
What is CVE-2024-26773?
CVE-2024-26773 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() Determine if the group block bitmap is corrupted be...
How severe is CVE-2024-26773?
CVE-2024-26773 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-26773?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux.