Vulnerability identifier: #VU94842
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-41015
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the ocfs2_check_dir_entry(), ocfs2_search_dirblock(), __ocfs2_delete_entry(), __ocfs2_add_entry(), ocfs2_dir_foreach_blk_id(), ocfs2_dir_foreach_blk_el(), ocfs2_find_dir_space_id() and ocfs2_find_dir_space_el() functions in fs/ocfs2/dir.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/13d38c00df97289e6fba2e54193959293fd910d2
https://git.kernel.org/stable/c/564d23cc5b216211e1694d53f7e45959396874d0
https://git.kernel.org/stable/c/77495e5da5cb110a8fed27b052c77853fe282176
https://git.kernel.org/stable/c/53de17ad01cb5f6f8426f597e9d5c87d4cf53bb7
https://git.kernel.org/stable/c/fd65685594ee707cbf3ddf22ebb73697786ac114
https://git.kernel.org/stable/c/e05a24289db90f76ff606086aadd62d068a88dcd
https://git.kernel.org/stable/c/624b380074f0dc209fb8706db3295c735079f34c
https://git.kernel.org/stable/c/edb2e67dd4626b06fd7eb37252d5067912e78d59
https://git.kernel.org/stable/c/255547c6bb8940a97eea94ef9d464ea5967763fb
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.