Input validation error in Linux kernel jfs



| Updated: 2025-05-13
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-41017
CWE-ID CWE-20
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Input validation error

EUVDB-ID: #VU94843

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-41017

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the __jfs_getxattr() and jfs_listxattr() functions in fs/jfs/xattr.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.19 - 6.10.1

CPE2.3 External links

https://git.kernel.org/stable/c/7f91bd0f2941fa36449ce1a15faaa64f840d9746
https://git.kernel.org/stable/c/fc16776a82e8df97b6c4f9a10ba95aa44cef7ba5
https://git.kernel.org/stable/c/6386f1b6a10e5d1ddd03db4ff6dfc55d488852ce
https://git.kernel.org/stable/c/7e21574195a45fc193555fa40e99fed16565ff7e
https://git.kernel.org/stable/c/4e034f7e563ab723b93a59980e4a1bb33198ece8
https://git.kernel.org/stable/c/17440dbc66ab98b410514b04987f61deedb86751
https://git.kernel.org/stable/c/f4435f476b9bf059cd9e26a69f5b29c768d00375
https://git.kernel.org/stable/c/dbde7bc91093fa9c2410e418b236b70fde044b73
https://git.kernel.org/stable/c/d0fa70aca54c8643248e89061da23752506ec0d4
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.319
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.223
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.164
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.281
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.102
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.2
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.43


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###