Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-26981
HistoryMay 01, 2024 - 12:00 a.m.

CVE-2024-26981

2024-05-0100:00:00
ubuntu.com
ubuntu.com
7
linux kernel
nilfs2
vulnerability
oob error
array resizing

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.1%

In the Linux kernel, the following vulnerability has been resolved: nilfs2:
fix OOB in nilfs_set_de_type The size of the nilfs_type_by_mode array in
the fs/nilfs2/dir.c file is defined as “S_IFMT >> S_SHIFT”, but the
nilfs_set_de_type() function, which uses this array, specifies the index to
read from the array in the same way as “(mode & S_IFMT) >> S_SHIFT”. static
void nilfs_set_de_type(struct nilfs_dir_entry *de, struct inode *inode) {
umode_t mode = inode->i_mode; de->file_type = nilfs_type_by_mode[(mode &
S_IFMT)>>S_SHIFT]; // oob } However, when the index is determined this way,
an out-of-bounds (OOB) error occurs by referring to an index that is 1
larger than the array size when the condition “mode & S_IFMT == S_IFMT” is
satisfied. Therefore, a patch to resize the nilfs_type_by_mode array should
be applied to prevent OOB errors.

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.1%