Lucene search

K
cveLinuxCVE-2024-43885
HistoryAug 26, 2024 - 11:15 a.m.

CVE-2024-43885

2024-08-2611:15:03
CWE-667
Linux
web.nvd.nist.gov
29
linux kernel
vulnerability resolution
btrfs fix

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

Low

EPSS

0

Percentile

5.0%

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix double inode unlock for direct IO sync writes

If we do a direct IO sync write, at btrfs_sync_file(), and we need to skip
inode logging or we get an error starting a transaction or an error when
flushing delalloc, we end up unlocking the inode when we shouldn’t under
the ‘out_release_extents’ label, and then unlock it again at
btrfs_direct_write().

Fix that by checking if we have to skip inode unlocking under that label.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelMatch6.11rc2
VendorProductVersionCPE
linuxlinux_kernel6.11cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "fs/btrfs/file.c"
    ],
    "versions": [
      {
        "version": "4e17707035a6",
        "lessThan": "1a607d22dea4",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "6cae8d04d8b3",
        "lessThan": "8bd4c9220416",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "0a108bde616a",
        "lessThan": "7ba27f14161f",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "3831170f7406",
        "lessThan": "d924a0be2f21",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "939b656bc8ab",
        "lessThan": "e0391e92f9ab",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "fs/btrfs/file.c"
    ],
    "versions": [
      {
        "version": "6.11-rc2",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "6.11-rc2",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.11-rc3",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

7

Confidence

Low

EPSS

0

Percentile

5.0%