CVE-2024-40902

In the Linux kernel, the following vulnerability has been resolved: jfs: xattr: fix buffer overflow for invalid xattr When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. But when that xattr size is bigger than the expected size, printing it out can cause an access off the end of the buffer. Fix this all up by properly restricting the size of the debug hex dump in the kernel log.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*

History

21 Nov 2024, 09:31

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a - Patch () https://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a - Patch
References () https://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123 - Patch () https://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123 - Patch
References () https://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69 - Patch () https://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69 - Patch
References () https://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7 - Patch () https://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7 - Patch
References () https://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f - Patch () https://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f - Patch
References () https://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f - Patch () https://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f - Patch
References () https://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f - Patch () https://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f - Patch
References () https://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0 - Patch () https://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0 - Patch

20 Aug 2024, 14:35

Type Values Removed Values Added
CWE CWE-121

24 Jul 2024, 18:52

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a - () https://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a - Patch
References () https://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123 - () https://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123 - Patch
References () https://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69 - () https://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69 - Patch
References () https://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7 - () https://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7 - Patch
References () https://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f - () https://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f - Patch
References () https://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f - () https://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f - Patch
References () https://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f - () https://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f - Patch
References () https://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0 - () https://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0 - Patch
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: jfs: xattr: corrige el desbordamiento del búfer para xattr no válido Cuando un tamaño de xattr no es el esperado, se imprime en el registro del kernel en formato hexadecimal como una forma de depuración. Pero cuando el tamaño de xattr es mayor que el tamaño esperado, imprimirlo puede provocar un acceso desde el final del búfer. Solucione todo esto restringiendo adecuadamente el tamaño del volcado hexadecimal de depuración en el registro del kernel.
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel

12 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2024-11-21 09:31


NVD link : CVE-2024-40902

Mitre link : CVE-2024-40902

CVE.ORG link : CVE-2024-40902


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-121

Stack-based Buffer Overflow