In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix OOB in nilfs_set_de_type
The size of the nilfs_type_by_mode array in the fs/nilfs2/dir.c file is
defined as "S_IFMT >> S_SHIFT", but the nilfs_set_de_type() function,
which uses this array, specifies the index to read from the array in the
same way as "(mode & S_IFMT) >> S_SHIFT".
static void nilfs_set_de_type(struct nilfs_dir_entry *de, struct inode
 *inode)
{
	umode_t mode = inode->i_mode;
	de->file_type = nilfs_type_by_mode[(mode & S_IFMT)>>S_SHIFT]; // oob
}
However, when the index is determined this way, an out-of-bounds (OOB)
error occurs by referring to an index that is 1 larger than the array size
when the condition "mode & S_IFMT == S_IFMT" is satisfied.  Therefore, a
patch to resize the nilfs_type_by_mode array should be applied to prevent
OOB errors.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 23 Dec 2024 21:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Debian Debian debian Linux Linux Linux linux Kernel | |
| Weaknesses | CWE-129 | |
| CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* | |
| Vendors & Products | Debian Debian debian Linux Linux Linux linux Kernel | |
| Metrics | cvssV3_1 
 | cvssV3_1 
 | 
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Tue, 05 Nov 2024 10:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Linux
Published: 2024-05-01T05:27:06.469Z
Updated: 2025-05-04T09:01:24.942Z
Reserved: 2024-02-19T14:20:24.204Z
Link: CVE-2024-26981
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T00:21:05.867Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-05-01T06:15:15.517
Modified: 2024-12-23T20:42:57.277
Link: CVE-2024-26981
 Redhat
                        Redhat