vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-26981): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | 05/01/2024 | 07/12/2024 | 01/30/2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix OOB in nilfs_set_de_type
The size of the nilfs_type_by_mode array in the fs/nilfs2/dir.c file is
defined as "S_IFMT >> S_SHIFT", but the nilfs_set_de_type() function,
which uses this array, specifies the index to read from the array in the
same way as "(mode & S_IFMT) >> S_SHIFT".
static void nilfs_set_de_type(struct nilfs_dir_entry *de, struct inode
*inode)
{
umode_t mode = inode->i_mode;
de->file_type = nilfs_type_by_mode[(mode & S_IFMT)>>S_SHIFT]; // oob
}
However, when the index is determined this way, an out-of-bounds (OOB)
error occurs by referring to an index that is 1 larger than the array size
when the condition "mode & S_IFMT == S_IFMT" is satisfied. Therefore, a
patch to resize the nilfs_type_by_mode array should be applied to prevent
OOB errors.
Solution(s)
References
- CVE-2024-26981
- https://attackerkb.com/topics/CVE-2024-26981
- UBUNTU-USN-6893-1
- UBUNTU-USN-6893-2
- UBUNTU-USN-6893-3
- UBUNTU-USN-6896-1
- UBUNTU-USN-6896-2
- UBUNTU-USN-6896-3
- UBUNTU-USN-6896-4
- UBUNTU-USN-6896-5
- UBUNTU-USN-6898-1
- UBUNTU-USN-6898-2
- UBUNTU-USN-6898-3
- UBUNTU-USN-6898-4
- UBUNTU-USN-6917-1
- UBUNTU-USN-6918-1
- UBUNTU-USN-6919-1
- UBUNTU-USN-6927-1
- UBUNTU-USN-7019-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.