In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinuxkernel,thefollowing vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().
| linux | | https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 | https://git.kernel.org/linus/2ba466d74ed74f073257f86e61519cb8f8f46184 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ("..") of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ("." and "..") inthe first chunk of the directory in nilfs_dotdot().The Linux kernel CVE team has assigned CVE-2024-41034 to this issue.
In the Linux kernel, the following vulnerability has been resolved:nilfs2: fix kernel bug on rename operation of broken directorySyzbot reported that in rename directory operation on broken directory onnilfs2, __block_write_begin_int() called to prepare block write may failBUG_ON check for access exceeding the folio/page size.This is because nilfs_dotdot(), which gets parent directory referenceentry ( .. ) of the directory to be moved or renamed, does not checkconsistency enough, and may return location exceeding folio/page size forbroken directories.Fix this issue by checking required directory entries ( . and .. ) inthe first chunk of the directory in nilfs_dotdot().