
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-41017 affects the Linux kernel's JFS (Journaling File System) implementation. The vulnerability was discovered and disclosed on July 29, 2024. The issue involves a potential buffer overflow vulnerability in the JFS extended attribute (xattr) handling code, where the system could walk off the end of the ealist (extended attribute list) (NVD).
The vulnerability exists in the fs/jfs/xattr.c file where the code fails to properly validate boundaries when traversing extended attribute lists. The fix adds checks before visiting the members of ea (extended attribute) to ensure each ea stays within the ealist bounds. The patch implements additional boundary checks using ealist_end pointer comparisons to prevent potential buffer overflows (Kernel Commit).
If exploited, this vulnerability could lead to a system crash or potentially allow reading beyond buffer boundaries in the JFS filesystem implementation. The issue affects systems using the JFS filesystem with extended attributes enabled (Ubuntu Security).
The vulnerability has been fixed in multiple Linux kernel versions. Ubuntu has released patches for versions 24.04 LTS (6.8.0-48.48), 22.04 LTS (5.15.0-125.135), and 20.04 LTS (5.4.0-200.220). Debian has also released fixes in version 6.1.119-1~deb11u1 for Debian 11. Users are advised to update their kernel to the patched versions (Ubuntu Security, Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."