In the Linux kernel, the following vulnerability has been resolved:
ext4: check stripe size compatibility on remount as well
We disable stripe size in _ext4fillsuper if it is not a multiple of the cluster ratio however this check is missed when trying to remount. This can leave us with cases where stripe < clusterratio after remount:set making EXT4B2C(sbi->sstripe) become 0 that can cause some unforeseen bugs like divide by 0.
Fix that by adding the check in remount path as well.
[
{
"deprecated": false,
"target": {
"file": "fs/ext4/super.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"253834528595312805688404537236432996582",
"50858719059904737269499459467177892348",
"18304087698261664284749254852867056032",
"118926737975342731127903066939195626078",
"209173787726902893689601335856914622435",
"249883764396854911379456956034659160773",
"157490747602032428568498592113458105910",
"274268784882422603840349694094440871227",
"313387498425327868403024122076636591353",
"245320897564149208121561119088673083979",
"16987215788210180049478713690146607647"
]
},
"id": "CVE-2024-47700-452125c2",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@faeff8b1ee2eaa5969c8e994d66c3337298cefed",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "fs/ext4/super.c",
"function": "__ext4_fill_super"
},
"digest": {
"length": 10502.0,
"function_hash": "51401999312173497037478002411760191936"
},
"id": "CVE-2024-47700-4b02d498",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@faeff8b1ee2eaa5969c8e994d66c3337298cefed",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "fs/ext4/super.c",
"function": "__ext4_remount"
},
"digest": {
"length": 6555.0,
"function_hash": "191439332651088007216452894674176239349"
},
"id": "CVE-2024-47700-5c57a103",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@297615e992bbb30a55c158141086be6505d5d722",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "fs/ext4/super.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"253834528595312805688404537236432996582",
"50858719059904737269499459467177892348",
"18304087698261664284749254852867056032",
"118926737975342731127903066939195626078",
"209173787726902893689601335856914622435",
"249883764396854911379456956034659160773",
"157490747602032428568498592113458105910",
"274268784882422603840349694094440871227",
"313387498425327868403024122076636591353",
"245320897564149208121561119088673083979",
"16987215788210180049478713690146607647"
]
},
"id": "CVE-2024-47700-791d2842",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@297615e992bbb30a55c158141086be6505d5d722",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "fs/ext4/super.c",
"function": "__ext4_fill_super"
},
"digest": {
"length": 10578.0,
"function_hash": "142674024771267884901441857203422532189"
},
"id": "CVE-2024-47700-7a1fe059",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ee85e0938aa8f9846d21e4d302c3cf6a2a75110d",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "fs/ext4/super.c",
"function": "__ext4_remount"
},
"digest": {
"length": 6555.0,
"function_hash": "191439332651088007216452894674176239349"
},
"id": "CVE-2024-47700-92b7a644",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@faeff8b1ee2eaa5969c8e994d66c3337298cefed",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "fs/ext4/super.c",
"function": "__ext4_fill_super"
},
"digest": {
"length": 10541.0,
"function_hash": "92040925712339398597479704685412436813"
},
"id": "CVE-2024-47700-aa5c09fd",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@297615e992bbb30a55c158141086be6505d5d722",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "fs/ext4/super.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"253834528595312805688404537236432996582",
"50858719059904737269499459467177892348",
"18304087698261664284749254852867056032",
"118926737975342731127903066939195626078",
"209173787726902893689601335856914622435",
"249883764396854911379456956034659160773",
"157490747602032428568498592113458105910",
"274268784882422603840349694094440871227",
"313387498425327868403024122076636591353",
"245320897564149208121561119088673083979",
"16987215788210180049478713690146607647"
]
},
"id": "CVE-2024-47700-ddfcb22f",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ee85e0938aa8f9846d21e4d302c3cf6a2a75110d",
"signature_version": "v1"
},
{
"deprecated": false,
"target": {
"file": "fs/ext4/super.c",
"function": "__ext4_remount"
},
"digest": {
"length": 6555.0,
"function_hash": "191439332651088007216452894674176239349"
},
"id": "CVE-2024-47700-f285a8a5",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ee85e0938aa8f9846d21e4d302c3cf6a2a75110d",
"signature_version": "v1"
}
]