vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-50202): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | 2024-11-08 | 2025-02-20 | 2025-04-29 |
Description
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: propagate directory read errors from nilfs_find_entry()
Syzbot reported that a task hang occurs in vcs_open() during a fuzzing
test for nilfs2.
The root cause of this problem is that in nilfs_find_entry(), which
searches for directory entries, ignores errors when loading a directory
page/folio via nilfs_get_folio() fails.
If the filesystem images is corrupted, and the i_size of the directory
inode is large, and the directory page/folio is successfully read but
fails the sanity check, for example when it is zero-filled,
nilfs_check_folio() may continue to spit out error messages in bursts.
Fix this issue by propagating the error to the callers when loading a
page/folio fails in nilfs_find_entry().
The current interface of nilfs_find_entry() and its callers is outdated
and cannot propagate error codes such as -EIO and -ENOMEM returned via
nilfs_find_entry(), so fix it together.
Solution(s)
References
- CVE-2024-50202
- https://attackerkb.com/topics/CVE-2024-50202
- UBUNTU-USN-7276-1
- UBUNTU-USN-7277-1
- UBUNTU-USN-7288-1
- UBUNTU-USN-7288-2
- UBUNTU-USN-7289-1
- UBUNTU-USN-7289-2
- UBUNTU-USN-7289-3
- UBUNTU-USN-7289-4
- UBUNTU-USN-7291-1
- UBUNTU-USN-7293-1
- UBUNTU-USN-7294-1
- UBUNTU-USN-7294-2
- UBUNTU-USN-7294-3
- UBUNTU-USN-7294-4
- UBUNTU-USN-7295-1
- UBUNTU-USN-7305-1
- UBUNTU-USN-7308-1
- UBUNTU-USN-7310-1
- UBUNTU-USN-7331-1
- UBUNTU-USN-7383-1
- UBUNTU-USN-7383-2
- UBUNTU-USN-7384-1
- UBUNTU-USN-7384-2
- UBUNTU-USN-7385-1
- UBUNTU-USN-7386-1
- UBUNTU-USN-7388-1
- UBUNTU-USN-7389-1
- UBUNTU-USN-7390-1
- UBUNTU-USN-7393-1
- UBUNTU-USN-7401-1
- UBUNTU-USN-7403-1
- UBUNTU-USN-7413-1
- UBUNTU-USN-7451-1
- UBUNTU-USN-7458-1
- UBUNTU-USN-7468-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.