In the Linux kernel, the following vulnerability has been resolved: ext4:
avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap
corrupt Determine if bb_fragments is 0 instead of determining bb_free to
eliminate the risk of dividing by zero when the block bitmap is corrupted.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-112.122 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1063.69 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1063.69~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1066.75 | UNKNOWN |
git.kernel.org/linus/993bf0f4c393b3667830918f9247438a8f6fdb5b (6.8-rc3)
git.kernel.org/stable/c/687061cfaa2ac3095170e136dd9c29a4974f41d4
git.kernel.org/stable/c/8b40eb2e716b503f7a4e1090815a17b1341b2150
git.kernel.org/stable/c/8cf9cc602cfb40085967c0d140e32691c8b71cf3
git.kernel.org/stable/c/993bf0f4c393b3667830918f9247438a8f6fdb5b
git.kernel.org/stable/c/f32d2a745b02123258026e105a008f474f896d6a
launchpad.net/bugs/cve/CVE-2024-26774
nvd.nist.gov/vuln/detail/CVE-2024-26774
security-tracker.debian.org/tracker/CVE-2024-26774
ubuntu.com/security/notices/USN-6820-1
ubuntu.com/security/notices/USN-6820-2
ubuntu.com/security/notices/USN-6821-1
ubuntu.com/security/notices/USN-6821-2
ubuntu.com/security/notices/USN-6821-3
ubuntu.com/security/notices/USN-6821-4
ubuntu.com/security/notices/USN-6828-1
ubuntu.com/security/notices/USN-6871-1
www.cve.org/CVERecord?id=CVE-2024-26774