| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Avoid using corrupted block bitmap buffer\n\nWhen the filesystem block bitmap is corrupted, we detect the corruption\nwhile loading the bitmap and fail the allocation with error. However the\nnext allocation from the same bitmap will notice the bitmap buffer is\nalready loaded and tries to allocate from the bitmap with mixed results\n(depending on the exact nature of the bitmap corruption). Fix the\nproblem by using BH_verified bit to indicate whether the bitmap is valid\nor not." |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "fs/udf/balloc.c", |
| "fs/udf/super.c" |
| ], |
| "versions": [ |
| { |
| "version": "7648ea9896b31aff38830d81188f5b7a1773e4a8", |
| "lessThan": "cae9e59cc41683408b70b9ab569f8654866ba914", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "4ac54312f623c6d2ca30c36c1ef530c11f5aff64", |
| "lessThan": "2199e157a465aaf98294d3932797ecd7fce942d5", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "099bf90d7fc4622da9fd4727f6d318a0f12d10be", |
| "lessThan": "6a43e3c210df6c5f00570f4be49a897677dbcb64", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "6ac8f2c8362afd2baa8e7b9c946597589e587d22", |
| "lessThan": "271cab2ca00652bc984e269cf1208699a1e09cdd", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "1e0d4adf17e7ef03281d7b16555e7c1508c8ed2d", |
| "lessThan": "57053b3bcf3403b80db6f65aba284d7dfe7326af", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "1e0d4adf17e7ef03281d7b16555e7c1508c8ed2d", |
| "lessThan": "8ca170c39eca7cad6e0cfeb24e351d8f8eddcd65", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "1e0d4adf17e7ef03281d7b16555e7c1508c8ed2d", |
| "lessThan": "a90d4471146de21745980cba51ce88e7926bcc4f", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "f862a9049c3f6e73a5504a1ac10ffd5bc253ab55", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "4622cc1b6d86013e01c56b60b092b5e4726c8e52", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "fs/udf/balloc.c", |
| "fs/udf/super.c" |
| ], |
| "versions": [ |
| { |
| "version": "6.3", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "6.3", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.4.282", |
| "lessThanOrEqual": "5.4.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.10.224", |
| "lessThanOrEqual": "5.10.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.165", |
| "lessThanOrEqual": "5.15.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1.103", |
| "lessThanOrEqual": "6.1.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.6.44", |
| "lessThanOrEqual": "6.6.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.10.3", |
| "lessThanOrEqual": "6.10.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.11", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.4.257", |
| "versionEndExcluding": "5.4.282" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.10.195", |
| "versionEndExcluding": "5.10.224" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.15.132", |
| "versionEndExcluding": "5.15.165" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.1.53", |
| "versionEndExcluding": "6.1.103" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.3", |
| "versionEndExcluding": "6.6.44" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.3", |
| "versionEndExcluding": "6.10.3" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.3", |
| "versionEndExcluding": "6.11" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.14.326" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.19.295" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/cae9e59cc41683408b70b9ab569f8654866ba914" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/2199e157a465aaf98294d3932797ecd7fce942d5" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/6a43e3c210df6c5f00570f4be49a897677dbcb64" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/271cab2ca00652bc984e269cf1208699a1e09cdd" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/57053b3bcf3403b80db6f65aba284d7dfe7326af" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/8ca170c39eca7cad6e0cfeb24e351d8f8eddcd65" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/a90d4471146de21745980cba51ce88e7926bcc4f" |
| } |
| ], |
| "title": "udf: Avoid using corrupted block bitmap buffer", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2024-42306", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |