๐Ÿ” CVE Alert

CVE-2024-50230

HIGH 7.8

nilfs2: fix kernel bug due to missing clearing of checked flag

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix kernel bug due to missing clearing of checked flag Syzbot reported that in directory operations after nilfs2 detects filesystem corruption and degrades to read-only, __block_write_begin_int(), which is called to prepare block writes, may fail the BUG_ON check for accesses exceeding the folio/page size, triggering a kernel bug. This was found to be because the "checked" flag of a page/folio was not cleared when it was discarded by nilfs2's own routine, which causes the sanity check of directory entries to be skipped when the directory page/folio is reloaded. So, fix that. This was necessary when the use of nilfs2's own page discard routine was applied to more than just metadata files.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 9, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8c26c4e2694a163d525976e804d81cd955bbb40c < 994b2fa13a6c9cf3feca93090a9c337d48e3d60d 8c26c4e2694a163d525976e804d81cd955bbb40c < 64afad73e4623308d8943645e5631f2c7a2d7971 8c26c4e2694a163d525976e804d81cd955bbb40c < aa0cee46c5d3fd9a39575a4c8a4f65f25f095b89 8c26c4e2694a163d525976e804d81cd955bbb40c < f05dbebb8ee34882505d53d83af7d18f28a49248 8c26c4e2694a163d525976e804d81cd955bbb40c < cd0cdb51b15203fa27d4b714be83b7dfffa0b752 8c26c4e2694a163d525976e804d81cd955bbb40c < f2f1fa446676c21edb777e6d2bc4fa8f956fab68 8c26c4e2694a163d525976e804d81cd955bbb40c < 56c6171932a7fb267ac6cb4ff8759b93ee1d0e2e 8c26c4e2694a163d525976e804d81cd955bbb40c < 41e192ad2779cae0102879612dfe46726e4396aa
Linux / Linux
3.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/994b2fa13a6c9cf3feca93090a9c337d48e3d60d git.kernel.org: https://git.kernel.org/stable/c/64afad73e4623308d8943645e5631f2c7a2d7971 git.kernel.org: https://git.kernel.org/stable/c/aa0cee46c5d3fd9a39575a4c8a4f65f25f095b89 git.kernel.org: https://git.kernel.org/stable/c/f05dbebb8ee34882505d53d83af7d18f28a49248 git.kernel.org: https://git.kernel.org/stable/c/cd0cdb51b15203fa27d4b714be83b7dfffa0b752 git.kernel.org: https://git.kernel.org/stable/c/f2f1fa446676c21edb777e6d2bc4fa8f956fab68 git.kernel.org: https://git.kernel.org/stable/c/56c6171932a7fb267ac6cb4ff8759b93ee1d0e2e git.kernel.org: https://git.kernel.org/stable/c/41e192ad2779cae0102879612dfe46726e4396aa lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html