Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-40902

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-12 Jul, 2024 | 12:20
Updated At-04 May, 2025 | 09:17
Rejected At-
Credits

jfs: xattr: fix buffer overflow for invalid xattr

In the Linux kernel, the following vulnerability has been resolved: jfs: xattr: fix buffer overflow for invalid xattr When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. But when that xattr size is bigger than the expected size, printing it out can cause an access off the end of the buffer. Fix this all up by properly restricting the size of the debug hex dump in the kernel log.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:12 Jul, 2024 | 12:20
Updated At:04 May, 2025 | 09:17
Rejected At:
▼CVE Numbering Authority (CNA)
jfs: xattr: fix buffer overflow for invalid xattr

In the Linux kernel, the following vulnerability has been resolved: jfs: xattr: fix buffer overflow for invalid xattr When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. But when that xattr size is bigger than the expected size, printing it out can cause an access off the end of the buffer. Fix this all up by properly restricting the size of the debug hex dump in the kernel log.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/jfs/xattr.c
Default Status
unaffected
Versions
Affected
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f0dedb5c511ed82cbaff4997a8decf2351ba549f (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1e84c9b1838152a87cf453270a5fa75c5037e83a (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before fc745f6e83cb650f9a5f2c864158e3a5ea76dad0 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 480e5bc21f2c42d90c2c16045d64d824dcdd5ec7 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 33aecc5799c93d3ee02f853cb94e201f9731f123 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 4598233d9748fe4db4e13b9f473588aa25e87d69 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before b537cb2f4c4a1357479716a9c339c0bda03d873f (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 7c55b78818cfb732680c4a72ab270cc2d2ee3d0f (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/jfs/xattr.c
Default Status
affected
Versions
Unaffected
  • From 4.19.317 through 4.19.* (semver)
  • From 5.4.279 through 5.4.* (semver)
  • From 5.10.221 through 5.10.* (semver)
  • From 5.15.162 through 5.15.* (semver)
  • From 6.1.95 through 6.1.* (semver)
  • From 6.6.35 through 6.6.* (semver)
  • From 6.9.6 through 6.9.* (semver)
  • From 6.10 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f
N/A
https://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a
N/A
https://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0
N/A
https://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7
N/A
https://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123
N/A
https://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69
N/A
https://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f
N/A
https://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f
N/A
Hyperlink: https://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f
x_transferred
https://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a
x_transferred
https://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0
x_transferred
https://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7
x_transferred
https://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123
x_transferred
https://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69
x_transferred
https://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f
x_transferred
https://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f
x_transferred
Hyperlink: https://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Default Status
unaffected
Versions
Affected
  • From 1da177e4c3f4 before f0dedb5c511e (git)
  • From 1da177e4c3f4 before 1e84c9b18381 (git)
  • From 1da177e4c3f4 before fc745f6e83cb (git)
  • From 1da177e4c3f4 before 480e5bc21f2c (git)
  • From 1da177e4c3f4 before 33aecc5799c9 (git)
  • From 1da177e4c3f4 before 4598233d9748 (git)
  • From 1da177e4c3f4 before b537cb2f4c4a (git)
  • From 1da177e4c3f4 before 7c55b78818cf (git)
Problem Types
TypeCWE IDDescription
CWECWE-121CWE-121 Stack-based Buffer Overflow
Type: CWE
CWE ID: CWE-121
Description: CWE-121 Stack-based Buffer Overflow
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:12 Jul, 2024 | 13:15
Updated At:20 Aug, 2024 | 14:35

In the Linux kernel, the following vulnerability has been resolved: jfs: xattr: fix buffer overflow for invalid xattr When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. But when that xattr size is bigger than the expected size, printing it out can cause an access off the end of the buffer. Fix this all up by properly restricting the size of the debug hex dump in the kernel log.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions before 4.19.317(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20(inclusive) to 5.4.279(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.221(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.162(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.95(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.35(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.9.6(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.10
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.10
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.10
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-120Primarynvd@nist.gov
CWE-121Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-120
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-121
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/1e84c9b1838152a87cf453270a5fa75c5037e83a
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/33aecc5799c93d3ee02f853cb94e201f9731f123
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/4598233d9748fe4db4e13b9f473588aa25e87d69
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/480e5bc21f2c42d90c2c16045d64d824dcdd5ec7
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/b537cb2f4c4a1357479716a9c339c0bda03d873f
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f0dedb5c511ed82cbaff4997a8decf2351ba549f
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/fc745f6e83cb650f9a5f2c864158e3a5ea76dad0
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found