CVE-2024-41014

CVE Details

Release Date:2024-07-29

Description


In the Linux kernel, the following vulnerability has been resolved:\nxfs: add bounds checking to xlog_recover_process_data\nThere is a lack of verification of the space occupied by fixed members\nof xlog_op_header in the xlog_recover_process_data.\nWe can create a crafted image to trigger an out of bounds read by\nfollowing these steps:\n1) Mount an image of xfs, and do some file operations to leave records\n2) Before umounting, copy the image for subsequent steps to simulate\nabnormal exit. Because umount will ensure that tail_blk and\nhead_blk are the same, which will result in the inability to enter\nxlog_recover_process_data\n3) Write a tool to parse and modify the copied image in step 2\n4) Make the end of the xlog_op_header entries only 1 byte away from\nxlog_rec_header->h_size\n5) xlog_rec_header->h_num_logops++\n6) Modify xlog_rec_header->h_crc\nFix:\nAdd a check to make sure there is sufficient space to access fixed members\nof xlog_op_header.

See more information about CVE-2024-41014 from MITRE CVE dictionary and NIST NVD


CVSS Scoring


NOTE: The following CVSS v3.1 metrics and score provided are preliminary and subject to review.

Base Score: 6.1 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Attack Vector: Local network Attack Complexity: Low
Privileges Required: Low User Interaction: None
Scope: Unchanged Confidentiality Impact: Low
Integrity Impact: None Availability Impact: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 8 (kernel)ELSA-2024-70002024-09-24
Oracle Linux version 9 (kernel)ELSA-2024-86172024-10-30


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete