In the Linux kernel, the following vulnerability has been resolved:
ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
xattr in ocfs2 maybe 'non-indexed', which saved with additional space
requested. It's better to check if the memory is out of bound before
memcmp, although this possibility mainly comes from crafted poisonous
images.
References
Configurations
Configuration 1 (hide)
|
History
03 Nov 2025, 22:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Nov 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
07 Oct 2025, 19:24
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/57a3d89831fcaa2cdbe024b47c7c36d5a56c3637 - Patch | |
| References | () https://git.kernel.org/stable/c/af77c4fc1871847b528d58b7fdafb4aa1f6a9262 - Patch | |
| References | () https://git.kernel.org/stable/c/c031d286eceb82f72f8623b7f4abd2aa491bfb5e - Patch | |
| References | () https://git.kernel.org/stable/c/c726dea9d0c806d64c26fcef483b1fb9474d8c5e - Patch | |
| References | () https://git.kernel.org/stable/c/cfb926051fab19b10d1e65976211f364aa820180 - Patch | |
| References | () https://git.kernel.org/stable/c/e2b3d7a9d019d4d1a0da6c3ea64a1ff79c99c090 - Patch | |
| References | () https://git.kernel.org/stable/c/e4ffea01adf3323c821b6f37e9577d2d400adbaa - Patch | |
| References | () https://git.kernel.org/stable/c/e8f9c4af7af7e9e4cd09c0251c7936593147419f - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
Information
Published : 2024-07-29 07:15
Updated : 2025-11-03 22:17
NVD link : CVE-2024-41016
Mitre link : CVE-2024-41016
CVE.ORG link : CVE-2024-41016
JSON object : View
Products Affected
linux
- linux_kernel
CWE
