{"api_version":"1","generated_at":"2026-04-23T03:49:57+00:00","cve":"CVE-2024-26772","urls":{"html":"https://cve.report/CVE-2024-26772","api":"https://cve.report/api/cve/CVE-2024-26772.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-26772","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-26772"},"summary":{"title":"CVE-2024-26772","description":"Description unavailable.","state":"PUBLISHED","assigner":"","published_at":"2024-04-03 17:15:00","updated_at":"2024-04-03 17:24:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7","name":"https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7","refsource":"","tags":[],"title":"ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43","name":"https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43","refsource":"","tags":[],"title":"ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d","name":"https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d","refsource":"","tags":[],"title":"ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff","name":"https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff","refsource":"","tags":[],"title":"ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586","name":"https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586","refsource":"","tags":[],"title":"ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a","name":"https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a","refsource":"","tags":[],"title":"ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916","name":"https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916","refsource":"","tags":[],"title":"ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513","name":"https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513","refsource":"","tags":[],"title":"ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() - kernel/git/stable/linux.git - Linux kernel stable tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-26772","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26772","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2024-26772","qid":"6000567","title":"Debian Security Update for linux (DSA 5658-1)"}]},"source_records":{"cve_program":null,"nvd":{"publishedDate":"2024-04-03 17:15:00","lastModifiedDate":"2024-04-03 17:24:00","problem_types":[],"metrics":[],"configurations":{"CVE_data_version":"4.0","nodes":[]}},"legacy_mitre":{"record":null,"notes":[]}}}