First published: Wed May 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: f2fs: compress: fix to guarantee persisting compressed blocks by CP If data block in compressed cluster is not persisted with metadata during checkpoint, after SPOR, the data may be corrupted, let's guarantee to write compressed page by checkpoint.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.119-1 6.12.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27035 is classified as a moderate severity vulnerability in the Linux kernel that could lead to data corruption.
To fix CVE-2024-27035, upgrade to the recommended versions of the Linux package: 6.1.123-1, 6.1.119-1, or 6.12.10-1.
The affected Linux versions for CVE-2024-27035 include those up to and including 5.10.226-1.
CVE-2024-27035 specifically affects the F2FS file system component related to block compression.
Yes, CVE-2024-27035 can lead to data corruption if data blocks are not persisted correctly during a checkpoint.