{"id":"CVE-2024-47757","summary":"nilfs2: fix potential oob read in nilfs_btree_check_delete()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential oob read in nilfs_btree_check_delete()\n\nThe function nilfs_btree_check_delete(), which checks whether degeneration\nto direct mapping occurs before deleting a b-tree entry, causes memory\naccess outside the block buffer when retrieving the maximum key if the\nroot node has no entries.\n\nThis does not usually happen because b-tree mappings with 0 child nodes\nare never created by mkfs.nilfs2 or nilfs2 itself.  However, it can happen\nif the b-tree root node read from a device is configured that way, so fix\nthis potential issue by adding a check for that case.","modified":"2026-04-02T12:20:28.036088Z","published":"2024-10-21T12:14:20.419Z","related":["MGASA-2024-0344","MGASA-2024-0345","SUSE-SU-2024:3984-1","SUSE-SU-2024:3986-1","SUSE-SU-2024:4038-1","SUSE-SU-2024:4315-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4345-1","SUSE-SU-2024:4346-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4376-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47757.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/257f9e5185eb6de83377caea686c306e22e871f2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a33e967b681e088a125b979975c93e3453e686cd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a8abfda768b9f33630cfbc4af6c4214f1e5681b0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c4cbcc64bb31e67e02940ce060cc77f7180564cf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c4f8554996e8ada3be872dfb8f60e93bcf15fb27"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d20674f31626e0596ae4c1d9401dfb6739b81b58"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ed76d381dae125b81d09934e365391a656249da8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f3a9859767c7aea758976f5523903d247e585129"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f9c96351aa6718b42a9f42eaf7adce0356bdb5e8"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47757.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47757"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"17c76b0104e4a6513983777e1a17e0297a12b0c4"},{"fixed":"f3a9859767c7aea758976f5523903d247e585129"},{"fixed":"ed76d381dae125b81d09934e365391a656249da8"},{"fixed":"d20674f31626e0596ae4c1d9401dfb6739b81b58"},{"fixed":"c4f8554996e8ada3be872dfb8f60e93bcf15fb27"},{"fixed":"a8abfda768b9f33630cfbc4af6c4214f1e5681b0"},{"fixed":"257f9e5185eb6de83377caea686c306e22e871f2"},{"fixed":"a33e967b681e088a125b979975c93e3453e686cd"},{"fixed":"c4cbcc64bb31e67e02940ce060cc77f7180564cf"},{"fixed":"f9c96351aa6718b42a9f42eaf7adce0356bdb5e8"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47757.json"}}],"schema_version":"1.7.5"}