#VU94842 Input validation error in Linux kernel - CVE-2024-41015


Vulnerability identifier: #VU94842

Vulnerability risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41015

CWE-ID: CWE-20

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the ocfs2_check_dir_entry(), ocfs2_search_dirblock(), __ocfs2_delete_entry(), __ocfs2_add_entry(), ocfs2_dir_foreach_blk_id(), ocfs2_dir_foreach_blk_el(), ocfs2_find_dir_space_id() and ocfs2_find_dir_space_el() functions in fs/ocfs2/dir.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/13d38c00df97289e6fba2e54193959293fd910d2
https://git.kernel.org/stable/c/564d23cc5b216211e1694d53f7e45959396874d0
https://git.kernel.org/stable/c/77495e5da5cb110a8fed27b052c77853fe282176
https://git.kernel.org/stable/c/53de17ad01cb5f6f8426f597e9d5c87d4cf53bb7
https://git.kernel.org/stable/c/fd65685594ee707cbf3ddf22ebb73697786ac114
https://git.kernel.org/stable/c/e05a24289db90f76ff606086aadd62d068a88dcd
https://git.kernel.org/stable/c/624b380074f0dc209fb8706db3295c735079f34c
https://git.kernel.org/stable/c/edb2e67dd4626b06fd7eb37252d5067912e78d59
https://git.kernel.org/stable/c/255547c6bb8940a97eea94ef9d464ea5967763fb


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability