{"id":"CVE-2024-50202","summary":"nilfs2: propagate directory read errors from nilfs_find_entry()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: propagate directory read errors from nilfs_find_entry()\n\nSyzbot reported that a task hang occurs in vcs_open() during a fuzzing\ntest for nilfs2.\n\nThe root cause of this problem is that in nilfs_find_entry(), which\nsearches for directory entries, ignores errors when loading a directory\npage/folio via nilfs_get_folio() fails.\n\nIf the filesystem images is corrupted, and the i_size of the directory\ninode is large, and the directory page/folio is successfully read but\nfails the sanity check, for example when it is zero-filled,\nnilfs_check_folio() may continue to spit out error messages in bursts.\n\nFix this issue by propagating the error to the callers when loading a\npage/folio fails in nilfs_find_entry().\n\nThe current interface of nilfs_find_entry() and its callers is outdated\nand cannot propagate error codes such as -EIO and -ENOMEM returned via\nnilfs_find_entry(), so fix it together.","modified":"2026-03-20T12:39:38.161463Z","published":"2024-11-08T05:56:16.544Z","related":["SUSE-SU-2025:0117-1","SUSE-SU-2025:0153-1","SUSE-SU-2025:0154-1","SUSE-SU-2025:0201-1","SUSE-SU-2025:0201-2","SUSE-SU-2025:0229-1","SUSE-SU-2025:0289-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7276-1","USN-7277-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50202.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/08cfa12adf888db98879dbd735bc741360a34168"},{"type":"WEB","url":"https://git.kernel.org/stable/c/270a6f9df35fa2aea01ec23770dc9b3fc9a12989"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9698088ac7704e260f492d9c254e29ed7dd8729a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b4b3dc9e7e604be98a222e9f941f5e93798ca475"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bb857ae1efd3138c653239ed1e7aef14e1242c81"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c1d0476885d708a932980b0f28cd90d9bd71db39"},{"type":"WEB","url":"https://git.kernel.org/stable/c/edf8146057264191d5bfe5b91773f13d936dadd3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/efa810b15a25531cbc2f527330947b9fe16916e7"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50202.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50202"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2ba466d74ed74f073257f86e61519cb8f8f46184"},{"fixed":"bb857ae1efd3138c653239ed1e7aef14e1242c81"},{"fixed":"b4b3dc9e7e604be98a222e9f941f5e93798ca475"},{"fixed":"c1d0476885d708a932980b0f28cd90d9bd71db39"},{"fixed":"edf8146057264191d5bfe5b91773f13d936dadd3"},{"fixed":"270a6f9df35fa2aea01ec23770dc9b3fc9a12989"},{"fixed":"9698088ac7704e260f492d9c254e29ed7dd8729a"},{"fixed":"efa810b15a25531cbc2f527330947b9fe16916e7"},{"fixed":"08cfa12adf888db98879dbd735bc741360a34168"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50202.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}