CVE-2024-41015

In the Linux kernel, the following vulnerability has been resolved: ocfs2: add bounds checking to ocfs2_check_dir_entry() This adds sanity checks for ocfs2_dir_entry to make sure all members of ocfs2_dir_entry don't stray beyond valid memory region.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

07 Oct 2025, 19:23

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/13d38c00df97289e6fba2e54193959293fd910d2 - () https://git.kernel.org/stable/c/13d38c00df97289e6fba2e54193959293fd910d2 - Patch
References () https://git.kernel.org/stable/c/255547c6bb8940a97eea94ef9d464ea5967763fb - () https://git.kernel.org/stable/c/255547c6bb8940a97eea94ef9d464ea5967763fb - Patch
References () https://git.kernel.org/stable/c/53de17ad01cb5f6f8426f597e9d5c87d4cf53bb7 - () https://git.kernel.org/stable/c/53de17ad01cb5f6f8426f597e9d5c87d4cf53bb7 - Patch
References () https://git.kernel.org/stable/c/564d23cc5b216211e1694d53f7e45959396874d0 - () https://git.kernel.org/stable/c/564d23cc5b216211e1694d53f7e45959396874d0 - Patch
References () https://git.kernel.org/stable/c/624b380074f0dc209fb8706db3295c735079f34c - () https://git.kernel.org/stable/c/624b380074f0dc209fb8706db3295c735079f34c - Patch
References () https://git.kernel.org/stable/c/77495e5da5cb110a8fed27b052c77853fe282176 - () https://git.kernel.org/stable/c/77495e5da5cb110a8fed27b052c77853fe282176 - Patch
References () https://git.kernel.org/stable/c/e05a24289db90f76ff606086aadd62d068a88dcd - () https://git.kernel.org/stable/c/e05a24289db90f76ff606086aadd62d068a88dcd - Patch
References () https://git.kernel.org/stable/c/edb2e67dd4626b06fd7eb37252d5067912e78d59 - () https://git.kernel.org/stable/c/edb2e67dd4626b06fd7eb37252d5067912e78d59 - Patch
References () https://git.kernel.org/stable/c/fd65685594ee707cbf3ddf22ebb73697786ac114 - () https://git.kernel.org/stable/c/fd65685594ee707cbf3ddf22ebb73697786ac114 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 09:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/13d38c00df97289e6fba2e54193959293fd910d2 - () https://git.kernel.org/stable/c/13d38c00df97289e6fba2e54193959293fd910d2 -
References () https://git.kernel.org/stable/c/255547c6bb8940a97eea94ef9d464ea5967763fb - () https://git.kernel.org/stable/c/255547c6bb8940a97eea94ef9d464ea5967763fb -
References () https://git.kernel.org/stable/c/53de17ad01cb5f6f8426f597e9d5c87d4cf53bb7 - () https://git.kernel.org/stable/c/53de17ad01cb5f6f8426f597e9d5c87d4cf53bb7 -
References () https://git.kernel.org/stable/c/564d23cc5b216211e1694d53f7e45959396874d0 - () https://git.kernel.org/stable/c/564d23cc5b216211e1694d53f7e45959396874d0 -
References () https://git.kernel.org/stable/c/624b380074f0dc209fb8706db3295c735079f34c - () https://git.kernel.org/stable/c/624b380074f0dc209fb8706db3295c735079f34c -
References () https://git.kernel.org/stable/c/77495e5da5cb110a8fed27b052c77853fe282176 - () https://git.kernel.org/stable/c/77495e5da5cb110a8fed27b052c77853fe282176 -
References () https://git.kernel.org/stable/c/e05a24289db90f76ff606086aadd62d068a88dcd - () https://git.kernel.org/stable/c/e05a24289db90f76ff606086aadd62d068a88dcd -
References () https://git.kernel.org/stable/c/edb2e67dd4626b06fd7eb37252d5067912e78d59 - () https://git.kernel.org/stable/c/edb2e67dd4626b06fd7eb37252d5067912e78d59 -
References () https://git.kernel.org/stable/c/fd65685594ee707cbf3ddf22ebb73697786ac114 - () https://git.kernel.org/stable/c/fd65685594ee707cbf3ddf22ebb73697786ac114 -

29 Jul 2024, 14:12

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: ocfs2: agregue verificación de límites a ocfs2_check_dir_entry() Esto agrega comprobaciones de sanitización para ocfs2_dir_entry para garantizar que todos los miembros de ocfs2_dir_entry no se desvíen más allá de la región de memoria válida.

29 Jul 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 07:15

Updated : 2025-10-07 19:23


NVD link : CVE-2024-41015

Mitre link : CVE-2024-41015

CVE.ORG link : CVE-2024-41015


JSON object : View

Products Affected

linux

  • linux_kernel