Lucene search

K
nvd416baaa9-dc9f-4396-8d5f-8c081fb06d67NVD:CVE-2024-26981
HistoryMay 01, 2024 - 6:15 a.m.

CVE-2024-26981

2024-05-0106:15:15
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
linux kernel
vulnerability
nilfs2
out-of-bounds error
directory entry type.

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.1%

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix OOB in nilfs_set_de_type

The size of the nilfs_type_by_mode array in the fs/nilfs2/dir.c file is
defined as “S_IFMT >> S_SHIFT”, but the nilfs_set_de_type() function,
which uses this array, specifies the index to read from the array in the
same way as “(mode & S_IFMT) >> S_SHIFT”.

static void nilfs_set_de_type(struct nilfs_dir_entry *de, struct inode
*inode)
{
umode_t mode = inode->i_mode;

de->file_type = nilfs_type_by_mode[(mode & S_IFMT)>>S_SHIFT]; // oob

}

However, when the index is determined this way, an out-of-bounds (OOB)
error occurs by referring to an index that is 1 larger than the array size
when the condition “mode & S_IFMT == S_IFMT” is satisfied. Therefore, a
patch to resize the nilfs_type_by_mode array should be applied to prevent
OOB errors.

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.1%