{"id":"CVE-2024-35807","summary":"ext4: fix corruption during on-line resize","details":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix corruption during on-line resize\n\nWe observed a corruption during on-line resize of a file system that is\nlarger than 16 TiB with 4k block size. With having more then 2^32 blocks\nresize_inode is turned off by default by mke2fs. The issue can be\nreproduced on a smaller file system for convenience by explicitly\nturning off resize_inode. An on-line resize across an 8 GiB boundary (the\nsize of a meta block group in this setup) then leads to a corruption:\n\n  dev=/dev/\u003csome_dev\u003e # should be \u003e= 16 GiB\n  mkdir -p /corruption\n  /sbin/mke2fs -t ext4 -b 4096 -O ^resize_inode $dev $((2 * 2**21 - 2**15))\n  mount -t ext4 $dev /corruption\n\n  dd if=/dev/zero bs=4096 of=/corruption/test count=$((2*2**21 - 4*2**15))\n  sha1sum /corruption/test\n  # 79d2658b39dcfd77274e435b0934028adafaab11  /corruption/test\n\n  /sbin/resize2fs $dev $((2*2**21))\n  # drop page cache to force reload the block from disk\n  echo 1 \u003e /proc/sys/vm/drop_caches\n\n  sha1sum /corruption/test\n  # 3c2abc63cbf1a94c9e6977e0fbd72cd832c4d5c3  /corruption/test\n\n2^21 = 2^15*2^6 equals 8 GiB whereof 2^15 is the number of blocks per\nblock group and 2^6 are the number of block groups that make a meta\nblock group.\n\nThe last checksum might be different depending on how the file is laid\nout across the physical blocks. The actual corruption occurs at physical\nblock 63*2^15 = 2064384 which would be the location of the backup of the\nmeta block group's block descriptor. During the on-line resize the file\nsystem will be converted to meta_bg starting at s_first_meta_bg which is\n2 in the example - meaning all block groups after 16 GiB. However, in\next4_flex_group_add we might add block groups that are not part of the\nfirst meta block group yet. In the reproducer we achieved this by\nsubstracting the size of a whole block group from the point where the\nmeta block group would start. This must be considered when updating the\nbackup block group descriptors to follow the non-meta_bg layout. The fix\nis to add a test whether the group to add is already part of the meta\nblock group or not.","modified":"2026-04-02T11:51:11.123968Z","published":"2024-05-17T13:23:14.869Z","related":["ALSA-2024:5101","ALSA-2024:5102","SUSE-SU-2024:2360-1","SUSE-SU-2024:2372-1","SUSE-SU-2024:2381-1","SUSE-SU-2024:2394-1","SUSE-SU-2024:2561-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35807.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/239c669edb2bffa1aa2612519b1d438ab35d6be6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/37b6a3ba793bbbae057f5b991970ebcc52cb3db5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/722d2c01b8b108f8283d1b7222209d5b2a5aa7bd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/75cc31c2e7193b69f5d25650bda5bb42ed92f8a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a6b3bfe176e8a5b05ec4447404e412c2a3fc92cc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b461910af8ba3bed80f48c2bf852686d05c6fc5c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e8e8b197317228b5089ed9e7802dadf3ccaa027a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ee4e9c1976147a850f6085a13fca95bcaa00d84c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fb1088d51bbaa0faec5a55d4f5818a9ab79e24df"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35807.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35807"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"01f795f9e0d67adeccc61a8b20c28acb45fa5fd8"},{"fixed":"75cc31c2e7193b69f5d25650bda5bb42ed92f8a1"},{"fixed":"ee4e9c1976147a850f6085a13fca95bcaa00d84c"},{"fixed":"e8e8b197317228b5089ed9e7802dadf3ccaa027a"},{"fixed":"239c669edb2bffa1aa2612519b1d438ab35d6be6"},{"fixed":"fb1088d51bbaa0faec5a55d4f5818a9ab79e24df"},{"fixed":"37b6a3ba793bbbae057f5b991970ebcc52cb3db5"},{"fixed":"b461910af8ba3bed80f48c2bf852686d05c6fc5c"},{"fixed":"722d2c01b8b108f8283d1b7222209d5b2a5aa7bd"},{"fixed":"a6b3bfe176e8a5b05ec4447404e412c2a3fc92cc"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35807.json"}}],"schema_version":"1.7.5"}