๐Ÿ” CVE Alert

CVE-2024-50116

MEDIUM 5.5

nilfs2: fix kernel bug due to missing clearing of buffer delay flag

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix kernel bug due to missing clearing of buffer delay flag Syzbot reported that after nilfs2 reads a corrupted file system image and degrades to read-only, the BUG_ON check for the buffer delay flag in submit_bh_wbc() may fail, causing a kernel bug. This is because the buffer delay flag is not cleared when clearing the buffer state flags to discard a page/folio or a buffer head. So, fix this. This became necessary when the use of nilfs2's own page clear routine was expanded. This state inconsistency does not occur if the buffer is written normally by log writing.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 5, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8c26c4e2694a163d525976e804d81cd955bbb40c < 033bc52f35868c2493a2d95c56ece7fc155d7cb3 8c26c4e2694a163d525976e804d81cd955bbb40c < 412a30b1b28d6073ba29c46a2b0f324c5936293f 8c26c4e2694a163d525976e804d81cd955bbb40c < 9f2ab98371c2f2488bf3bf3f9b2a73510545e9c1 8c26c4e2694a163d525976e804d81cd955bbb40c < 822203f6355f4b322d21e7115419f6b98284be25 8c26c4e2694a163d525976e804d81cd955bbb40c < 27524f65621f490184f2ace44cd8e5f3685af4a3 8c26c4e2694a163d525976e804d81cd955bbb40c < 743c78d455e784097011ea958b27396001181567 8c26c4e2694a163d525976e804d81cd955bbb40c < c6f58ff2d4c552927fe9a187774e668ebba6c7aa 8c26c4e2694a163d525976e804d81cd955bbb40c < 6ed469df0bfbef3e4b44fca954a781919db9f7ab
Linux / Linux
3.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/033bc52f35868c2493a2d95c56ece7fc155d7cb3 git.kernel.org: https://git.kernel.org/stable/c/412a30b1b28d6073ba29c46a2b0f324c5936293f git.kernel.org: https://git.kernel.org/stable/c/9f2ab98371c2f2488bf3bf3f9b2a73510545e9c1 git.kernel.org: https://git.kernel.org/stable/c/822203f6355f4b322d21e7115419f6b98284be25 git.kernel.org: https://git.kernel.org/stable/c/27524f65621f490184f2ace44cd8e5f3685af4a3 git.kernel.org: https://git.kernel.org/stable/c/743c78d455e784097011ea958b27396001181567 git.kernel.org: https://git.kernel.org/stable/c/c6f58ff2d4c552927fe9a187774e668ebba6c7aa git.kernel.org: https://git.kernel.org/stable/c/6ed469df0bfbef3e4b44fca954a781919db9f7ab lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html