{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-39469","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-06-25T14:23:23.745Z","datePublished":"2024-06-25T14:28:55.581Z","dateUpdated":"2025-11-03T21:56:03.781Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:16:28.206Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors\n\nThe error handling in nilfs_empty_dir() when a directory folio/page read\nfails is incorrect, as in the old ext2 implementation, and if the\nfolio/page cannot be read or nilfs_check_folio() fails, it will falsely\ndetermine the directory as empty and corrupt the file system.\n\nIn addition, since nilfs_empty_dir() does not immediately return on a\nfailed folio/page read, but continues to loop, this can cause a long loop\nwith I/O if i_size of the directory's inode is also corrupted, causing the\nlog writer thread to wait and hang, as reported by syzbot.\n\nFix these issues by making nilfs_empty_dir() immediately return a false\nvalue (0) if it fails to get a directory folio/page."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/nilfs2/dir.c"],"versions":[{"version":"2ba466d74ed74f073257f86e61519cb8f8f46184","lessThan":"2ac8a2fe22bdde9eecce2a42cf5cab79333fb428","status":"affected","versionType":"git"},{"version":"2ba466d74ed74f073257f86e61519cb8f8f46184","lessThan":"405b71f1251e5ae865f53bd27c45114e6c83bee3","status":"affected","versionType":"git"},{"version":"2ba466d74ed74f073257f86e61519cb8f8f46184","lessThan":"c77ad608df6c091fe64ecb91f41ef7cb465587f1","status":"affected","versionType":"git"},{"version":"2ba466d74ed74f073257f86e61519cb8f8f46184","lessThan":"11a2edb70356a2202dcb7c9c189c8356ab4752cd","status":"affected","versionType":"git"},{"version":"2ba466d74ed74f073257f86e61519cb8f8f46184","lessThan":"129dcd3e7d036218db3f59c82d82004b9539ed82","status":"affected","versionType":"git"},{"version":"2ba466d74ed74f073257f86e61519cb8f8f46184","lessThan":"d18b05eda7fa77f02114f15b02c009f28ee42346","status":"affected","versionType":"git"},{"version":"2ba466d74ed74f073257f86e61519cb8f8f46184","lessThan":"59f14875a96ef93f05b82ad3c980605f2cb444b5","status":"affected","versionType":"git"},{"version":"2ba466d74ed74f073257f86e61519cb8f8f46184","lessThan":"7373a51e7998b508af7136530f3a997b286ce81c","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/nilfs2/dir.c"],"versions":[{"version":"2.6.30","status":"affected"},{"version":"0","lessThan":"2.6.30","status":"unaffected","versionType":"semver"},{"version":"4.19.317","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.279","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.221","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.162","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.95","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.35","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.9.5","lessThanOrEqual":"6.9.*","status":"unaffected","versionType":"semver"},{"version":"6.10","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"4.19.317"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"5.4.279"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"5.10.221"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"5.15.162"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"6.1.95"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"6.6.35"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"6.9.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.30","versionEndExcluding":"6.10"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/2ac8a2fe22bdde9eecce2a42cf5cab79333fb428"},{"url":"https://git.kernel.org/stable/c/405b71f1251e5ae865f53bd27c45114e6c83bee3"},{"url":"https://git.kernel.org/stable/c/c77ad608df6c091fe64ecb91f41ef7cb465587f1"},{"url":"https://git.kernel.org/stable/c/11a2edb70356a2202dcb7c9c189c8356ab4752cd"},{"url":"https://git.kernel.org/stable/c/129dcd3e7d036218db3f59c82d82004b9539ed82"},{"url":"https://git.kernel.org/stable/c/d18b05eda7fa77f02114f15b02c009f28ee42346"},{"url":"https://git.kernel.org/stable/c/59f14875a96ef93f05b82ad3c980605f2cb444b5"},{"url":"https://git.kernel.org/stable/c/7373a51e7998b508af7136530f3a997b286ce81c"}],"title":"nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/2ac8a2fe22bdde9eecce2a42cf5cab79333fb428","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/405b71f1251e5ae865f53bd27c45114e6c83bee3","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/c77ad608df6c091fe64ecb91f41ef7cb465587f1","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/11a2edb70356a2202dcb7c9c189c8356ab4752cd","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/129dcd3e7d036218db3f59c82d82004b9539ed82","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/d18b05eda7fa77f02114f15b02c009f28ee42346","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/59f14875a96ef93f05b82ad3c980605f2cb444b5","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/7373a51e7998b508af7136530f3a997b286ce81c","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T21:56:03.781Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-39469","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T17:07:55.313333Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:34:41.781Z"}}]}}