In the Linux kernel, the following vulnerability has been resolved:
block: refine the EOF check in blkdeviomapbegin
blkdeviomapbegin rounds down the offset to the logical block size before stashing it in iomap->offset and checking that it still is inside the inode size.
Check the i_size check to the raw pos value so that we don't try a zero size write if iter->pos is unaligned.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10b723bcba8986537a484aa94dbfc9093fd776a1",
"signature_version": "v1",
"id": "CVE-2024-38604-0cc8ab14",
"signature_type": "Function",
"digest": {
"function_hash": "171155272500648048315569924893328244356",
"length": 471.0
},
"deprecated": false,
"target": {
"function": "blkdev_iomap_begin",
"file": "block/fops.c"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@910717920c8c3f9386277a44c44d448058a18084",
"signature_version": "v1",
"id": "CVE-2024-38604-23023534",
"signature_type": "Function",
"digest": {
"function_hash": "171155272500648048315569924893328244356",
"length": 471.0
},
"deprecated": false,
"target": {
"function": "blkdev_iomap_begin",
"file": "block/fops.c"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@72c54e063c32aeb38d43a2bd897821e6e5a1757d",
"signature_version": "v1",
"id": "CVE-2024-38604-35d04b22",
"signature_type": "Function",
"digest": {
"function_hash": "171155272500648048315569924893328244356",
"length": 471.0
},
"deprecated": false,
"target": {
"function": "blkdev_iomap_begin",
"file": "block/fops.c"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c12028aec837f5a002009bbf68d179d506510e8",
"signature_version": "v1",
"id": "CVE-2024-38604-49a7a895",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"157222370802689540955092759741378274201",
"236607352279480951583014009523313821435",
"196198609151930053373600069849608158925",
"313000309022546508196793939923601885975"
]
},
"deprecated": false,
"target": {
"file": "block/fops.c"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10b723bcba8986537a484aa94dbfc9093fd776a1",
"signature_version": "v1",
"id": "CVE-2024-38604-a34325bc",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"157222370802689540955092759741378274201",
"236607352279480951583014009523313821435",
"196198609151930053373600069849608158925",
"313000309022546508196793939923601885975"
]
},
"deprecated": false,
"target": {
"file": "block/fops.c"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@910717920c8c3f9386277a44c44d448058a18084",
"signature_version": "v1",
"id": "CVE-2024-38604-e13d8c6f",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"157222370802689540955092759741378274201",
"236607352279480951583014009523313821435",
"196198609151930053373600069849608158925",
"313000309022546508196793939923601885975"
]
},
"deprecated": false,
"target": {
"file": "block/fops.c"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c12028aec837f5a002009bbf68d179d506510e8",
"signature_version": "v1",
"id": "CVE-2024-38604-f498bdf5",
"signature_type": "Function",
"digest": {
"function_hash": "171155272500648048315569924893328244356",
"length": 471.0
},
"deprecated": false,
"target": {
"function": "blkdev_iomap_begin",
"file": "block/fops.c"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@72c54e063c32aeb38d43a2bd897821e6e5a1757d",
"signature_version": "v1",
"id": "CVE-2024-38604-ff85efdc",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"157222370802689540955092759741378274201",
"236607352279480951583014009523313821435",
"196198609151930053373600069849608158925",
"313000309022546508196793939923601885975"
]
},
"deprecated": false,
"target": {
"file": "block/fops.c"
}
}
]