Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-33847
HistoryJun 25, 2024 - 12:00 a.m.

CVE-2024-33847

2024-06-2500:00:00
ubuntu.com
ubuntu.com
linux kernel
f2fs
compression
vulnerability
inode
corruption
fix

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.4%

In the Linux kernel, the following vulnerability has been resolved:
f2fs: compress: don’t allow unaligned truncation on released compress inode
f2fs image may be corrupted after below testcase:

  • mkfs.f2fs -O extra_attr,compression -f /dev/vdb
  • mount /dev/vdb /mnt/f2fs
  • touch /mnt/f2fs/file
  • f2fs_io setflags compression /mnt/f2fs/file
  • dd if=/dev/zero of=/mnt/f2fs/file bs=4k count=4
  • f2fs_io release_cblocks /mnt/f2fs/file
  • truncate -s 8192 /mnt/f2fs/file
  • umount /mnt/f2fs
  • fsck.f2fs /dev/vdb
    [ASSERT] (fsck_chk_inode_blk:1256) –> ino: 0x5 has i_blocks: 0x00000002,
    but has 0x3 blocks
    [FSCK] valid_block_count matching with CP [Fail] [0x4, 0x5]
    [FSCK] other corrupted bugs [Fail]
    The reason is: partial truncation assume compressed inode has reserved
    blocks, after partial truncation, valid block count may change w/o
    .i_blocks and .total_valid_block_count update, result in corruption.
    This patch only allow cluster size aligned truncation on released
    compress inode for fixing.

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.4%