In the Linux kernel, the following vulnerability has been resolved:
nilfs2: protect references to superblock parameters exposed in sysfs
The superblock buffers of nilfs2 can not only be overwritten at runtime
for modifications/repairs, but they are also regularly swapped, replaced
during resizing, and even abandoned when degrading to one side due to
backing device issues. So, accessing them requires mutual exclusion using
the reader/writer semaphore "nilfs->ns_sem".
Some sysfs attribute show methods read this superblock buffer without the
necessary mutual exclusion, which can cause problems with pointer
dereferencing and memory access, so fix it.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 18 Sep 2024 07:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: nilfs2: protect references to superblock parameters exposed in sysfs The superblock buffers of nilfs2 can not only be overwritten at runtime for modifications/repairs, but they are also regularly swapped, replaced during resizing, and even abandoned when degrading to one side due to backing device issues. So, accessing them requires mutual exclusion using the reader/writer semaphore "nilfs->ns_sem". Some sysfs attribute show methods read this superblock buffer without the necessary mutual exclusion, which can cause problems with pointer dereferencing and memory access, so fix it. | |
Title | nilfs2: protect references to superblock parameters exposed in sysfs | |
References |
|
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-09-18T07:12:36.736Z
Updated: 2024-09-18T07:12:36.736Z
Reserved: 2024-09-11T15:12:18.276Z
Link: CVE-2024-46780
Vulnrichment
No data.
NVD
Status : Awaiting Analysis
Published: 2024-09-18T08:15:05.473
Modified: 2024-09-20T12:30:51.220
Link: CVE-2024-46780
Redhat