製品・ソフトウェアに関する情報
Linux の Linux Kernel 等複数ベンダの製品における脆弱性
Title Linux の Linux Kernel 等複数ベンダの製品における脆弱性
Summary

Linux の Linux Kernel 等複数ベンダの製品には、不特定の脆弱性が存在します。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date March 14, 2024, midnight
Registration Date Dec. 25, 2025, 2:15 p.m.
Last Update Dec. 25, 2025, 2:15 p.m.
CVSS3.0 : 重要
Score 7.8
Vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected System
Debian
Debian GNU/Linux 10.0
Linux
Linux Kernel 2.6.31 以上 4.19.312 未満
Linux Kernel 4.20 以上 5.4.274 未満
Linux Kernel 5.11 以上 5.15.154 未満
Linux Kernel 5.16 以上 6.1.84 未満
Linux Kernel 5.5 以上 5.10.215 未満
Linux Kernel 6.2 以上 6.6.24 未満
Linux Kernel 6.7 以上 6.7.12 未満
Linux Kernel 6.8 以上 6.8.3 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2025年12月25日]   掲載 Dec. 25, 2025, 10:44 a.m.

NVD Vulnerability Information
CVE-2024-26956
Summary

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix failure to detect DAT corruption in btree and direct mappings

Patch series "nilfs2: fix kernel bug at submit_bh_wbc()".

This resolves a kernel BUG reported by syzbot. Since there are two
flaws involved, I've made each one a separate patch.

The first patch alone resolves the syzbot-reported bug, but I think
both fixes should be sent to stable, so I've tagged them as such.

This patch (of 2):

Syzbot has reported a kernel bug in submit_bh_wbc() when writing file data
to a nilfs2 file system whose metadata is corrupted.

There are two flaws involved in this issue.

The first flaw is that when nilfs_get_block() locates a data block using
btree or direct mapping, if the disk address translation routine
nilfs_dat_translate() fails with internal code -ENOENT due to DAT metadata
corruption, it can be passed back to nilfs_get_block(). This causes
nilfs_get_block() to misidentify an existing block as non-existent,
causing both data block lookup and insertion to fail inconsistently.

The second flaw is that nilfs_get_block() returns a successful status in
this inconsistent state. This causes the caller __block_write_begin_int()
or others to request a read even though the buffer is not mapped,
resulting in a BUG_ON check for the BH_Mapped flag in submit_bh_wbc()
failing.

This fixes the first issue by changing the return value to code -EINVAL
when a conversion using DAT fails with code -ENOENT, avoiding the
conflicting condition that leads to the kernel bug described above. Here,
code -EINVAL indicates that metadata corruption was detected during the
block lookup, which will be properly handled as a file system error and
converted to -EIO when passing through the nilfs2 bmap layer.

Publication Date May 1, 2024, 3:15 p.m.
Registration Date May 1, 2024, 8 p.m.
Last Update Nov. 21, 2024, 6:03 p.m.
Related information, measures and tools
Common Vulnerabilities List