fkie_cve-2024-41015
Vulnerability from fkie_nvd
Published
2024-07-29 07:15
Modified
2024-11-21 09:32
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: ocfs2: add bounds checking to ocfs2_check_dir_entry() This adds sanity checks for ocfs2_dir_entry to make sure all members of ocfs2_dir_entry don't stray beyond valid memory region.
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/13d38c00df97289e6fba2e54193959293fd910d2
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/255547c6bb8940a97eea94ef9d464ea5967763fb
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/53de17ad01cb5f6f8426f597e9d5c87d4cf53bb7
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/564d23cc5b216211e1694d53f7e45959396874d0
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/624b380074f0dc209fb8706db3295c735079f34c
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/77495e5da5cb110a8fed27b052c77853fe282176
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/e05a24289db90f76ff606086aadd62d068a88dcd
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/edb2e67dd4626b06fd7eb37252d5067912e78d59
416baaa9-dc9f-4396-8d5f-8c081fb06d67https://git.kernel.org/stable/c/fd65685594ee707cbf3ddf22ebb73697786ac114
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/13d38c00df97289e6fba2e54193959293fd910d2
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/255547c6bb8940a97eea94ef9d464ea5967763fb
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/53de17ad01cb5f6f8426f597e9d5c87d4cf53bb7
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/564d23cc5b216211e1694d53f7e45959396874d0
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/624b380074f0dc209fb8706db3295c735079f34c
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/77495e5da5cb110a8fed27b052c77853fe282176
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/e05a24289db90f76ff606086aadd62d068a88dcd
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/edb2e67dd4626b06fd7eb37252d5067912e78d59
af854a3a-2127-422b-91ae-364da2661108https://git.kernel.org/stable/c/fd65685594ee707cbf3ddf22ebb73697786ac114
Impacted products
Vendor Product Version



{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: add bounds checking to ocfs2_check_dir_entry()\n\nThis adds sanity checks for ocfs2_dir_entry to make sure all members of\nocfs2_dir_entry don\u0027t stray beyond valid memory region."
    },
    {
      "lang": "es",
      "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ocfs2: agregue verificaci\u00f3n de l\u00edmites a ocfs2_check_dir_entry() Esto agrega comprobaciones de sanitizaci\u00f3n para ocfs2_dir_entry para garantizar que todos los miembros de ocfs2_dir_entry no se desv\u00eden m\u00e1s all\u00e1 de la regi\u00f3n de memoria v\u00e1lida."
    }
  ],
  "id": "CVE-2024-41015",
  "lastModified": "2024-11-21T09:32:04.217",
  "metrics": {},
  "published": "2024-07-29T07:15:06.033",
  "references": [
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/13d38c00df97289e6fba2e54193959293fd910d2"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/255547c6bb8940a97eea94ef9d464ea5967763fb"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/53de17ad01cb5f6f8426f597e9d5c87d4cf53bb7"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/564d23cc5b216211e1694d53f7e45959396874d0"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/624b380074f0dc209fb8706db3295c735079f34c"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/77495e5da5cb110a8fed27b052c77853fe282176"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/e05a24289db90f76ff606086aadd62d068a88dcd"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/edb2e67dd4626b06fd7eb37252d5067912e78d59"
    },
    {
      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "url": "https://git.kernel.org/stable/c/fd65685594ee707cbf3ddf22ebb73697786ac114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/13d38c00df97289e6fba2e54193959293fd910d2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/255547c6bb8940a97eea94ef9d464ea5967763fb"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/53de17ad01cb5f6f8426f597e9d5c87d4cf53bb7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/564d23cc5b216211e1694d53f7e45959396874d0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/624b380074f0dc209fb8706db3295c735079f34c"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/77495e5da5cb110a8fed27b052c77853fe282176"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/e05a24289db90f76ff606086aadd62d068a88dcd"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/edb2e67dd4626b06fd7eb37252d5067912e78d59"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.kernel.org/stable/c/fd65685594ee707cbf3ddf22ebb73697786ac114"
    }
  ],
  "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
  "vulnStatus": "Awaiting Analysis"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…