Vulnerability identifier: #VU92319
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-38599
CWE-ID:
CWE-125
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the do_jffs2_setxattr() function in fs/jffs2/xattr.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/2904e1d9b64f72d291095e3cbb31634f08788b11
https://git.kernel.org/stable/c/526235dffcac74c7823ed504dfac4f88d84ba5df
https://git.kernel.org/stable/c/f0eea095ce8c959b86e1e57fe36ca4fea5ae54f8
https://git.kernel.org/stable/c/a1d21bcd78cf4a4353e1e835789429c6b76aca8b
https://git.kernel.org/stable/c/f06969df2e40ab1dc8f4364a5de967830c74a098
https://git.kernel.org/stable/c/af82d8d2179b7277ad627c39e7e0778f1c86ccdb
https://git.kernel.org/stable/c/8d431391320c5c5398ff966fb3a95e68a7def275
https://git.kernel.org/stable/c/978a12c91b38bf1a213e567f3c20e2beef215f07
https://git.kernel.org/stable/c/c6854e5a267c28300ff045480b5a7ee7f6f1d913
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.