Sanity Check Added to Prevent Overflow in ocfs2_truncate_inline

CVE-2024-50218
Currently unrated 🤨

Key Information

Vendor
Linux
Status
Linux
Vendor
CVE Published:
9 November 2024

Summary

In the Linux kernel, the following vulnerability has been resolved: ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow Syzbot reported a kernel BUG in ocfs2_truncate_inline. There are two reasons for this: first, the parameter value passed is greater than ocfs2_max_inline_data_with_xattr, second, the start and end parameters of ocfs2_truncate_inline are "unsigned int". So, we need to add a sanity check for byte_start and byte_len right before ocfs2_truncate_inline() in ocfs2_remove_inode_range(), if they are greater than ocfs2_max_inline_data_with_xattr return -EINVAL.

Affected Version(s)

Linux < 27d95867bee8

Linux < 95fbed8ae8c3

Linux < 70767689ec6e

Timeline

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database
.