CVE-2024-41013
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
29/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xfs: don&#39;t walk off the end of a directory data block<br />
<br />
This adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry<br />
to make sure don&#39;t stray beyond valid memory region. Before patching, the<br />
loop simply checks that the start offset of the dup and dep is within the<br />
range. So in a crafted image, if last entry is xfs_dir2_data_unused, we<br />
can change dup->length to dup->length-1 and leave 1 byte of space. In the<br />
next traversal, this space will be considered as dup or dep. We may<br />
encounter an out of bound read when accessing the fixed members.<br />
<br />
In the patch, we make sure that the remaining bytes large enough to hold<br />
an unused entry before accessing xfs_dir2_data_unused and<br />
xfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make<br />
sure that the remaining bytes large enough to hold a dirent with a<br />
single-byte name before accessing xfs_dir2_data_entry.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.142 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.68 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0c7fcdb6d06cdf8b19b57c17605215b06afa864a
- https://git.kernel.org/stable/c/b0932e4f9da85349d1c8f2a77d2a7a7163b8511d
- https://git.kernel.org/stable/c/ca96d83c93071f95cf962ce92406621a472df31b
- https://git.kernel.org/stable/c/0c7fcdb6d06cdf8b19b57c17605215b06afa864a
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



