THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-26774

ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt

AssignerLinux
Reserved2024-02-19
Published2024-04-03
Updated2024-05-29

Description

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt Determine if bb_fragments is 0 instead of determining bb_free to eliminate the risk of dividing by zero when the block bitmap is corrupted.

Product status

Default status
unaffected

1da177e4c3f4 before 687061cfaa2a
affected

1da177e4c3f4 before 8b40eb2e716b
affected

1da177e4c3f4 before f32d2a745b02
affected

1da177e4c3f4 before 8cf9cc602cfb
affected

1da177e4c3f4 before 993bf0f4c393
affected

Default status
affected

5.15.150
unaffected

6.1.80
unaffected

6.6.19
unaffected

6.7.7
unaffected

6.8
unaffected

References

https://git.kernel.org/stable/c/687061cfaa2ac3095170e136dd9c29a4974f41d4

https://git.kernel.org/stable/c/8b40eb2e716b503f7a4e1090815a17b1341b2150

https://git.kernel.org/stable/c/f32d2a745b02123258026e105a008f474f896d6a

https://git.kernel.org/stable/c/8cf9cc602cfb40085967c0d140e32691c8b71cf3

https://git.kernel.org/stable/c/993bf0f4c393b3667830918f9247438a8f6fdb5b

cve.org CVE-2024-26774

nvd.nist.gov CVE-2024-26774

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-26774
© Copyright 2024 THREATINT. Made in Cyprus with +