CVE-2024-42115 (GCVE-0-2024-42115)
Vulnerability from cvelistv5
Published
2024-07-30 07:46
Modified
2026-01-05 10:51
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: jffs2: Fix potential illegal address access in jffs2_free_inode During the stress testing of the jffs2 file system,the following abnormal printouts were found: [ 2430.649000] Unable to handle kernel paging request at virtual address 0069696969696948 [ 2430.649622] Mem abort info: [ 2430.649829] ESR = 0x96000004 [ 2430.650115] EC = 0x25: DABT (current EL), IL = 32 bits [ 2430.650564] SET = 0, FnV = 0 [ 2430.650795] EA = 0, S1PTW = 0 [ 2430.651032] FSC = 0x04: level 0 translation fault [ 2430.651446] Data abort info: [ 2430.651683] ISV = 0, ISS = 0x00000004 [ 2430.652001] CM = 0, WnR = 0 [ 2430.652558] [0069696969696948] address between user and kernel address ranges [ 2430.653265] Internal error: Oops: 96000004 [#1] PREEMPT SMP [ 2430.654512] CPU: 2 PID: 20919 Comm: cat Not tainted 5.15.25-g512f31242bf6 #33 [ 2430.655008] Hardware name: linux,dummy-virt (DT) [ 2430.655517] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 2430.656142] pc : kfree+0x78/0x348 [ 2430.656630] lr : jffs2_free_inode+0x24/0x48 [ 2430.657051] sp : ffff800009eebd10 [ 2430.657355] x29: ffff800009eebd10 x28: 0000000000000001 x27: 0000000000000000 [ 2430.658327] x26: ffff000038f09d80 x25: 0080000000000000 x24: ffff800009d38000 [ 2430.658919] x23: 5a5a5a5a5a5a5a5a x22: ffff000038f09d80 x21: ffff8000084f0d14 [ 2430.659434] x20: ffff0000bf9a6ac0 x19: 0169696969696940 x18: 0000000000000000 [ 2430.659969] x17: ffff8000b6506000 x16: ffff800009eec000 x15: 0000000000004000 [ 2430.660637] x14: 0000000000000000 x13: 00000001000820a1 x12: 00000000000d1b19 [ 2430.661345] x11: 0004000800000000 x10: 0000000000000001 x9 : ffff8000084f0d14 [ 2430.662025] x8 : ffff0000bf9a6b40 x7 : ffff0000bf9a6b48 x6 : 0000000003470302 [ 2430.662695] x5 : ffff00002e41dcc0 x4 : ffff0000bf9aa3b0 x3 : 0000000003470342 [ 2430.663486] x2 : 0000000000000000 x1 : ffff8000084f0d14 x0 : fffffc0000000000 [ 2430.664217] Call trace: [ 2430.664528] kfree+0x78/0x348 [ 2430.664855] jffs2_free_inode+0x24/0x48 [ 2430.665233] i_callback+0x24/0x50 [ 2430.665528] rcu_do_batch+0x1ac/0x448 [ 2430.665892] rcu_core+0x28c/0x3c8 [ 2430.666151] rcu_core_si+0x18/0x28 [ 2430.666473] __do_softirq+0x138/0x3cc [ 2430.666781] irq_exit+0xf0/0x110 [ 2430.667065] handle_domain_irq+0x6c/0x98 [ 2430.667447] gic_handle_irq+0xac/0xe8 [ 2430.667739] call_on_irq_stack+0x28/0x54 The parameter passed to kfree was 5a5a5a5a, which corresponds to the target field of the jffs_inode_info structure. It was found that all variables in the jffs_inode_info structure were 5a5a5a5a, except for the first member sem. It is suspected that these variables are not initialized because they were set to 5a5a5a5a during memory testing, which is meant to detect uninitialized memory.The sem variable is initialized in the function jffs2_i_init_once, while other members are initialized in the function jffs2_init_inode_info. The function jffs2_init_inode_info is called after iget_locked, but in the iget_locked function, the destroy_inode process is triggered, which releases the inode and consequently, the target member of the inode is not initialized.In concurrent high pressure scenarios, iget_locked may enter the destroy_inode branch as described in the code. Since the destroy_inode functionality of jffs2 only releases the target, the fix method is to set target to NULL in jffs2_i_init_once.
Impacted products
Vendor Product Version
Linux Linux Version: e22c11da0a8683d22011bbce18da493c079d67b3
Version: 4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca
Version: 4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca
Version: 4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca
Version: 4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca
Version: 4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca
Version: 4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca
Version: 4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca
Version: 44a476cf0bc2209c3c91ad9815cccc4a5ea2ca72
Version: 90a015d4d782371571058672be7fecbc685e34ec
Version: ff250f4c804f342695c35e1a39b63666086f2cab
Version: f9c04ee063108bfe16a7232429402866aa0ddd26
Version: 66559d395933540c5ae7fd26aacec1ddbe579a29
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T22:01:50.018Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b6c8b3e31eb88c85094d848a0bd8b4bafe67e4d8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/0b3246052e01e61a55bb3a15b76acb006759fe67"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/6d6d94287f6365282bbf41e9a5b5281985970789"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5ca26334fc8a3711fed14db7f9eb1c621be4df65"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/751987a5d8ead0cc405fad96e83ebbaa51c82dbc"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d0bbbf31462a400bef4df33e22de91864f475455"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/05fc1ef892f862c1197b11b288bc00f602d2df0c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/af9a8730ddb6a4b2edd779ccc0aceb994d616830"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42115",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:17:16.786814Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:06.015Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/jffs2/super.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b6c8b3e31eb88c85094d848a0bd8b4bafe67e4d8",
              "status": "affected",
              "version": "e22c11da0a8683d22011bbce18da493c079d67b3",
              "versionType": "git"
            },
            {
              "lessThan": "0b3246052e01e61a55bb3a15b76acb006759fe67",
              "status": "affected",
              "version": "4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca",
              "versionType": "git"
            },
            {
              "lessThan": "6d6d94287f6365282bbf41e9a5b5281985970789",
              "status": "affected",
              "version": "4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca",
              "versionType": "git"
            },
            {
              "lessThan": "5ca26334fc8a3711fed14db7f9eb1c621be4df65",
              "status": "affected",
              "version": "4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca",
              "versionType": "git"
            },
            {
              "lessThan": "751987a5d8ead0cc405fad96e83ebbaa51c82dbc",
              "status": "affected",
              "version": "4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca",
              "versionType": "git"
            },
            {
              "lessThan": "d0bbbf31462a400bef4df33e22de91864f475455",
              "status": "affected",
              "version": "4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca",
              "versionType": "git"
            },
            {
              "lessThan": "05fc1ef892f862c1197b11b288bc00f602d2df0c",
              "status": "affected",
              "version": "4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca",
              "versionType": "git"
            },
            {
              "lessThan": "af9a8730ddb6a4b2edd779ccc0aceb994d616830",
              "status": "affected",
              "version": "4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "44a476cf0bc2209c3c91ad9815cccc4a5ea2ca72",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "90a015d4d782371571058672be7fecbc685e34ec",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "ff250f4c804f342695c35e1a39b63666086f2cab",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "f9c04ee063108bfe16a7232429402866aa0ddd26",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "66559d395933540c5ae7fd26aacec1ddbe579a29",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/jffs2/super.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.1"
            },
            {
              "lessThan": "5.1",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.318",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.280",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.222",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.163",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.98",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.39",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.9.*",
              "status": "unaffected",
              "version": "6.9.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.10",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.318",
                  "versionStartIncluding": "4.19.41",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.280",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.222",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.163",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.98",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.39",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.9.9",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10",
                  "versionStartIncluding": "5.1",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.18.140",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.4.180",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.174",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.14.117",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.0.14",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\njffs2: Fix potential illegal address access in jffs2_free_inode\n\nDuring the stress testing of the jffs2 file system,the following\nabnormal printouts were found:\n[ 2430.649000] Unable to handle kernel paging request at virtual address 0069696969696948\n[ 2430.649622] Mem abort info:\n[ 2430.649829]   ESR = 0x96000004\n[ 2430.650115]   EC = 0x25: DABT (current EL), IL = 32 bits\n[ 2430.650564]   SET = 0, FnV = 0\n[ 2430.650795]   EA = 0, S1PTW = 0\n[ 2430.651032]   FSC = 0x04: level 0 translation fault\n[ 2430.651446] Data abort info:\n[ 2430.651683]   ISV = 0, ISS = 0x00000004\n[ 2430.652001]   CM = 0, WnR = 0\n[ 2430.652558] [0069696969696948] address between user and kernel address ranges\n[ 2430.653265] Internal error: Oops: 96000004 [#1] PREEMPT SMP\n[ 2430.654512] CPU: 2 PID: 20919 Comm: cat Not tainted 5.15.25-g512f31242bf6 #33\n[ 2430.655008] Hardware name: linux,dummy-virt (DT)\n[ 2430.655517] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 2430.656142] pc : kfree+0x78/0x348\n[ 2430.656630] lr : jffs2_free_inode+0x24/0x48\n[ 2430.657051] sp : ffff800009eebd10\n[ 2430.657355] x29: ffff800009eebd10 x28: 0000000000000001 x27: 0000000000000000\n[ 2430.658327] x26: ffff000038f09d80 x25: 0080000000000000 x24: ffff800009d38000\n[ 2430.658919] x23: 5a5a5a5a5a5a5a5a x22: ffff000038f09d80 x21: ffff8000084f0d14\n[ 2430.659434] x20: ffff0000bf9a6ac0 x19: 0169696969696940 x18: 0000000000000000\n[ 2430.659969] x17: ffff8000b6506000 x16: ffff800009eec000 x15: 0000000000004000\n[ 2430.660637] x14: 0000000000000000 x13: 00000001000820a1 x12: 00000000000d1b19\n[ 2430.661345] x11: 0004000800000000 x10: 0000000000000001 x9 : ffff8000084f0d14\n[ 2430.662025] x8 : ffff0000bf9a6b40 x7 : ffff0000bf9a6b48 x6 : 0000000003470302\n[ 2430.662695] x5 : ffff00002e41dcc0 x4 : ffff0000bf9aa3b0 x3 : 0000000003470342\n[ 2430.663486] x2 : 0000000000000000 x1 : ffff8000084f0d14 x0 : fffffc0000000000\n[ 2430.664217] Call trace:\n[ 2430.664528]  kfree+0x78/0x348\n[ 2430.664855]  jffs2_free_inode+0x24/0x48\n[ 2430.665233]  i_callback+0x24/0x50\n[ 2430.665528]  rcu_do_batch+0x1ac/0x448\n[ 2430.665892]  rcu_core+0x28c/0x3c8\n[ 2430.666151]  rcu_core_si+0x18/0x28\n[ 2430.666473]  __do_softirq+0x138/0x3cc\n[ 2430.666781]  irq_exit+0xf0/0x110\n[ 2430.667065]  handle_domain_irq+0x6c/0x98\n[ 2430.667447]  gic_handle_irq+0xac/0xe8\n[ 2430.667739]  call_on_irq_stack+0x28/0x54\nThe parameter passed to kfree was 5a5a5a5a, which corresponds to the target field of\nthe jffs_inode_info structure. It was found that all variables in the jffs_inode_info\nstructure were 5a5a5a5a, except for the first member sem. It is suspected that these\nvariables are not initialized because they were set to 5a5a5a5a during memory testing,\nwhich is meant to detect uninitialized memory.The sem variable is initialized in the\nfunction jffs2_i_init_once, while other members are initialized in\nthe function jffs2_init_inode_info.\n\nThe function jffs2_init_inode_info is called after iget_locked,\nbut in the iget_locked function, the destroy_inode process is triggered,\nwhich releases the inode and consequently, the target member of the inode\nis not initialized.In concurrent high pressure scenarios, iget_locked\nmay enter the destroy_inode branch as described in the code.\n\nSince the destroy_inode functionality of jffs2 only releases the target,\nthe fix method is to set target to NULL in jffs2_i_init_once."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-05T10:51:54.974Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b6c8b3e31eb88c85094d848a0bd8b4bafe67e4d8"
        },
        {
          "url": "https://git.kernel.org/stable/c/0b3246052e01e61a55bb3a15b76acb006759fe67"
        },
        {
          "url": "https://git.kernel.org/stable/c/6d6d94287f6365282bbf41e9a5b5281985970789"
        },
        {
          "url": "https://git.kernel.org/stable/c/5ca26334fc8a3711fed14db7f9eb1c621be4df65"
        },
        {
          "url": "https://git.kernel.org/stable/c/751987a5d8ead0cc405fad96e83ebbaa51c82dbc"
        },
        {
          "url": "https://git.kernel.org/stable/c/d0bbbf31462a400bef4df33e22de91864f475455"
        },
        {
          "url": "https://git.kernel.org/stable/c/05fc1ef892f862c1197b11b288bc00f602d2df0c"
        },
        {
          "url": "https://git.kernel.org/stable/c/af9a8730ddb6a4b2edd779ccc0aceb994d616830"
        }
      ],
      "title": "jffs2: Fix potential illegal address access in jffs2_free_inode",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-42115",
    "datePublished": "2024-07-30T07:46:08.276Z",
    "dateReserved": "2024-07-29T15:50:41.178Z",
    "dateUpdated": "2026-01-05T10:51:54.974Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b6c8b3e31eb88c85094d848a0bd8b4bafe67e4d8\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/0b3246052e01e61a55bb3a15b76acb006759fe67\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/6d6d94287f6365282bbf41e9a5b5281985970789\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5ca26334fc8a3711fed14db7f9eb1c621be4df65\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/751987a5d8ead0cc405fad96e83ebbaa51c82dbc\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/d0bbbf31462a400bef4df33e22de91864f475455\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/05fc1ef892f862c1197b11b288bc00f602d2df0c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/af9a8730ddb6a4b2edd779ccc0aceb994d616830\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T22:01:50.018Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-42115\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:17:16.786814Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:14.528Z\"}}], \"cna\": {\"title\": \"jffs2: Fix potential illegal address access in jffs2_free_inode\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"e22c11da0a8683d22011bbce18da493c079d67b3\", \"lessThan\": \"b6c8b3e31eb88c85094d848a0bd8b4bafe67e4d8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca\", \"lessThan\": \"0b3246052e01e61a55bb3a15b76acb006759fe67\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca\", \"lessThan\": \"6d6d94287f6365282bbf41e9a5b5281985970789\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca\", \"lessThan\": \"5ca26334fc8a3711fed14db7f9eb1c621be4df65\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca\", \"lessThan\": \"751987a5d8ead0cc405fad96e83ebbaa51c82dbc\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca\", \"lessThan\": \"d0bbbf31462a400bef4df33e22de91864f475455\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca\", \"lessThan\": \"05fc1ef892f862c1197b11b288bc00f602d2df0c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca\", \"lessThan\": \"af9a8730ddb6a4b2edd779ccc0aceb994d616830\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"44a476cf0bc2209c3c91ad9815cccc4a5ea2ca72\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"90a015d4d782371571058672be7fecbc685e34ec\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ff250f4c804f342695c35e1a39b63666086f2cab\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f9c04ee063108bfe16a7232429402866aa0ddd26\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"66559d395933540c5ae7fd26aacec1ddbe579a29\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/jffs2/super.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.1\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.1\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.318\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.280\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.222\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.163\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.98\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.39\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/jffs2/super.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b6c8b3e31eb88c85094d848a0bd8b4bafe67e4d8\"}, {\"url\": \"https://git.kernel.org/stable/c/0b3246052e01e61a55bb3a15b76acb006759fe67\"}, {\"url\": \"https://git.kernel.org/stable/c/6d6d94287f6365282bbf41e9a5b5281985970789\"}, {\"url\": \"https://git.kernel.org/stable/c/5ca26334fc8a3711fed14db7f9eb1c621be4df65\"}, {\"url\": \"https://git.kernel.org/stable/c/751987a5d8ead0cc405fad96e83ebbaa51c82dbc\"}, {\"url\": \"https://git.kernel.org/stable/c/d0bbbf31462a400bef4df33e22de91864f475455\"}, {\"url\": \"https://git.kernel.org/stable/c/05fc1ef892f862c1197b11b288bc00f602d2df0c\"}, {\"url\": \"https://git.kernel.org/stable/c/af9a8730ddb6a4b2edd779ccc0aceb994d616830\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\njffs2: Fix potential illegal address access in jffs2_free_inode\\n\\nDuring the stress testing of the jffs2 file system,the following\\nabnormal printouts were found:\\n[ 2430.649000] Unable to handle kernel paging request at virtual address 0069696969696948\\n[ 2430.649622] Mem abort info:\\n[ 2430.649829]   ESR = 0x96000004\\n[ 2430.650115]   EC = 0x25: DABT (current EL), IL = 32 bits\\n[ 2430.650564]   SET = 0, FnV = 0\\n[ 2430.650795]   EA = 0, S1PTW = 0\\n[ 2430.651032]   FSC = 0x04: level 0 translation fault\\n[ 2430.651446] Data abort info:\\n[ 2430.651683]   ISV = 0, ISS = 0x00000004\\n[ 2430.652001]   CM = 0, WnR = 0\\n[ 2430.652558] [0069696969696948] address between user and kernel address ranges\\n[ 2430.653265] Internal error: Oops: 96000004 [#1] PREEMPT SMP\\n[ 2430.654512] CPU: 2 PID: 20919 Comm: cat Not tainted 5.15.25-g512f31242bf6 #33\\n[ 2430.655008] Hardware name: linux,dummy-virt (DT)\\n[ 2430.655517] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\n[ 2430.656142] pc : kfree+0x78/0x348\\n[ 2430.656630] lr : jffs2_free_inode+0x24/0x48\\n[ 2430.657051] sp : ffff800009eebd10\\n[ 2430.657355] x29: ffff800009eebd10 x28: 0000000000000001 x27: 0000000000000000\\n[ 2430.658327] x26: ffff000038f09d80 x25: 0080000000000000 x24: ffff800009d38000\\n[ 2430.658919] x23: 5a5a5a5a5a5a5a5a x22: ffff000038f09d80 x21: ffff8000084f0d14\\n[ 2430.659434] x20: ffff0000bf9a6ac0 x19: 0169696969696940 x18: 0000000000000000\\n[ 2430.659969] x17: ffff8000b6506000 x16: ffff800009eec000 x15: 0000000000004000\\n[ 2430.660637] x14: 0000000000000000 x13: 00000001000820a1 x12: 00000000000d1b19\\n[ 2430.661345] x11: 0004000800000000 x10: 0000000000000001 x9 : ffff8000084f0d14\\n[ 2430.662025] x8 : ffff0000bf9a6b40 x7 : ffff0000bf9a6b48 x6 : 0000000003470302\\n[ 2430.662695] x5 : ffff00002e41dcc0 x4 : ffff0000bf9aa3b0 x3 : 0000000003470342\\n[ 2430.663486] x2 : 0000000000000000 x1 : ffff8000084f0d14 x0 : fffffc0000000000\\n[ 2430.664217] Call trace:\\n[ 2430.664528]  kfree+0x78/0x348\\n[ 2430.664855]  jffs2_free_inode+0x24/0x48\\n[ 2430.665233]  i_callback+0x24/0x50\\n[ 2430.665528]  rcu_do_batch+0x1ac/0x448\\n[ 2430.665892]  rcu_core+0x28c/0x3c8\\n[ 2430.666151]  rcu_core_si+0x18/0x28\\n[ 2430.666473]  __do_softirq+0x138/0x3cc\\n[ 2430.666781]  irq_exit+0xf0/0x110\\n[ 2430.667065]  handle_domain_irq+0x6c/0x98\\n[ 2430.667447]  gic_handle_irq+0xac/0xe8\\n[ 2430.667739]  call_on_irq_stack+0x28/0x54\\nThe parameter passed to kfree was 5a5a5a5a, which corresponds to the target field of\\nthe jffs_inode_info structure. It was found that all variables in the jffs_inode_info\\nstructure were 5a5a5a5a, except for the first member sem. It is suspected that these\\nvariables are not initialized because they were set to 5a5a5a5a during memory testing,\\nwhich is meant to detect uninitialized memory.The sem variable is initialized in the\\nfunction jffs2_i_init_once, while other members are initialized in\\nthe function jffs2_init_inode_info.\\n\\nThe function jffs2_init_inode_info is called after iget_locked,\\nbut in the iget_locked function, the destroy_inode process is triggered,\\nwhich releases the inode and consequently, the target member of the inode\\nis not initialized.In concurrent high pressure scenarios, iget_locked\\nmay enter the destroy_inode branch as described in the code.\\n\\nSince the destroy_inode functionality of jffs2 only releases the target,\\nthe fix method is to set target to NULL in jffs2_i_init_once.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.318\", \"versionStartIncluding\": \"4.19.41\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.280\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.222\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.163\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.98\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.39\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.9.9\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10\", \"versionStartIncluding\": \"5.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"3.18.140\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.4.180\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.9.174\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.14.117\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"5.0.14\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2026-01-05T10:51:54.974Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-42115\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-05T10:51:54.974Z\", \"dateReserved\": \"2024-07-29T15:50:41.178Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-30T07:46:08.276Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…