In the Linux kernel, the following vulnerability has been resolved:
bcachefs: Fix sb_field_downgrade validation
- bch2_sb_downgrade_validate() wasn't checking for a downgrade entry
extending past the end of the superblock section
- for_each_downgrade_entry() is used in to_text() and needs to work on
malformed input; it also was missing a check for a field extending
past the end of the section
bcachefs: Fix sb_field_downgrade validation
- bch2_sb_downgrade_validate() wasn't checking for a downgrade entry
extending past the end of the superblock section
- for_each_downgrade_entry() is used in to_text() and needs to work on
malformed input; it also was missing a check for a field extending
past the end of the section
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
USN-7089-1 | Linux kernel vulnerabilities |
![]() |
USN-7089-2 | Linux kernel vulnerabilities |
![]() |
USN-7089-3 | Linux kernel vulnerabilities |
![]() |
USN-7089-4 | Linux kernel vulnerabilities |
![]() |
USN-7089-5 | Linux kernel vulnerabilities |
![]() |
USN-7089-6 | Linux kernel vulnerabilities |
![]() |
USN-7089-7 | Linux kernel (Low Latency) vulnerabilities |
![]() |
USN-7090-1 | Linux kernel vulnerabilities |
![]() |
USN-7095-1 | Linux kernel vulnerabilities |
![]() |
USN-7156-1 | Linux kernel (GKE) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 09 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:* |
Wed, 09 Oct 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-20 | CWE-125 |
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 06 Sep 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-20 |

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T09:21:46.571Z
Reserved: 2024-07-12T12:17:45.634Z
Link: CVE-2024-41086

Updated: 2024-08-02T04:46:52.363Z

Status : Analyzed
Published: 2024-07-29T16:15:04.043
Modified: 2025-10-09T18:00:35.550
Link: CVE-2024-41086


Updated: 2025-07-12T23:06:33Z