CVE-2024-41014
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
29/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xfs: add bounds checking to xlog_recover_process_data<br />
<br />
There is a lack of verification of the space occupied by fixed members<br />
of xlog_op_header in the xlog_recover_process_data.<br />
<br />
We can create a crafted image to trigger an out of bounds read by<br />
following these steps:<br />
1) Mount an image of xfs, and do some file operations to leave records<br />
2) Before umounting, copy the image for subsequent steps to simulate<br />
abnormal exit. Because umount will ensure that tail_blk and<br />
head_blk are the same, which will result in the inability to enter<br />
xlog_recover_process_data<br />
3) Write a tool to parse and modify the copied image in step 2<br />
4) Make the end of the xlog_op_header entries only 1 byte away from<br />
xlog_rec_header->h_size<br />
5) xlog_rec_header->h_num_logops++<br />
6) Modify xlog_rec_header->h_crc<br />
<br />
Fix:<br />
Add a check to make sure there is sufficient space to access fixed members<br />
of xlog_op_header.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.120 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/7cd9f0a33e738cd58876f1bc8d6c1aa5bc4fc8c1
- https://git.kernel.org/stable/c/d1e3efe783365db59da88f08a2e0bfe1cc95b143
- https://git.kernel.org/stable/c/fb63435b7c7dc112b1ae1baea5486e0a6e27b196
- https://git.kernel.org/stable/c/fb63435b7c7dc112b1ae1baea5486e0a6e27b196
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



