In the Linux kernel, the following vulnerability has been resolved:
jfs: add check read-only before txBeginAnon() call
Added a read-only check before calling txBeginAnon in extAlloc
and extRecord. This prevents modification attempts on a read-only
mounted filesystem, avoiding potential errors or crashes.
Call trace: txBeginAnon+0xac/0x154 extAlloc+0xe8/0xdec fs/jfs/jfsextent.c:78 jfsgetblock+0x340/0xb98 fs/jfs/inode.c:248 _blockwritebeginint+0x580/0x166c fs/buffer.c:2128 _blockwritebegin fs/buffer.c:2177 [inline] blockwritebegin+0x98/0x11c fs/buffer.c:2236 jfswritebegin+0x44/0x88 fs/jfs/inode.c:299
[
{
"id": "CVE-2024-58095-001fbc62",
"target": {
"file": "fs/jfs/jfs_extent.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"18758402215973254607931337468372167568",
"268773140518990402971024596416167023110",
"289204766832671773159663568858257206655",
"116109084143511196102611166952305776644",
"76833369537329214645723637327315210598",
"2715107210619033586931327371137526318"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0176e69743ecc02961f2ae1ea42439cd2bf9ed58",
"signature_version": "v1"
},
{
"id": "CVE-2024-58095-111bd0b2",
"target": {
"file": "fs/jfs/jfs_extent.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"18758402215973254607931337468372167568",
"268773140518990402971024596416167023110",
"289204766832671773159663568858257206655",
"116109084143511196102611166952305776644",
"76833369537329214645723637327315210598",
"2715107210619033586931327371137526318"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@15469c408af2d7a52fb186a92f2f091b0f13b1fb",
"signature_version": "v1"
},
{
"id": "CVE-2024-58095-37ccdfd0",
"target": {
"file": "fs/jfs/jfs_extent.c",
"function": "extRecord"
},
"digest": {
"function_hash": "186717180550764186121854400070851582265",
"length": 249.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0176e69743ecc02961f2ae1ea42439cd2bf9ed58",
"signature_version": "v1"
},
{
"id": "CVE-2024-58095-b7535caf",
"target": {
"file": "fs/jfs/jfs_extent.c",
"function": "extAlloc"
},
"digest": {
"function_hash": "147818931578715861067788554279655867612",
"length": 1497.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@15469c408af2d7a52fb186a92f2f091b0f13b1fb",
"signature_version": "v1"
},
{
"id": "CVE-2024-58095-b821c73e",
"target": {
"file": "fs/jfs/jfs_extent.c",
"function": "extAlloc"
},
"digest": {
"function_hash": "147818931578715861067788554279655867612",
"length": 1497.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0176e69743ecc02961f2ae1ea42439cd2bf9ed58",
"signature_version": "v1"
},
{
"id": "CVE-2024-58095-f64cb1d6",
"target": {
"file": "fs/jfs/jfs_extent.c",
"function": "extRecord"
},
"digest": {
"function_hash": "186717180550764186121854400070851582265",
"length": 249.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@15469c408af2d7a52fb186a92f2f091b0f13b1fb",
"signature_version": "v1"
}
]