
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-42304 affects the Linux kernel's ext4 filesystem implementation. The vulnerability was discovered when syzbot identified a condition where a directory could be constructed with no dirblock but is non-inline, meaning the first directory block is a hole. This vulnerability was disclosed in August 2024 and affects Linux kernel systems using the ext4 filesystem (Kernel Git).
The vulnerability exists in the ext4 filesystem code where no errors are reported when creating files in a directory with a hole in its first block. The issue occurs in the following flow: ext4mknod calls ext4addentry, which reads block 0 through ext4readdirblock(dir, block, DIRENT). When bh = ext4bread(NULL, inode, block, 0) is called, if the block is a hole, no error is reported because the type == DIRENT condition is not caught in the error checking logic (Kernel Git).
This vulnerability results in a directory block without '.' and '..' entries but with a valid dentry. This can cause system crashes when code that relies on dot or dotdot entries (such as makeindexeddir()) attempts to access these entries. The impact primarily affects filesystem integrity and system stability (Kernel Git).
The issue has been fixed by modifying ext4readdirblock() to report filesystem corruption and return an error when it finds that the first directory block is a hole. This prevents loading corrupted data from disk. The fix has been implemented in various kernel versions and is available through system updates (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."