
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-43858 addresses an array-index-out-of-bounds vulnerability in the Linux kernel's JFS (Journaled File System) component, specifically in the diFree function. The vulnerability was discovered on August 17, 2024, and affects Linux kernel versions from 2.6.12 through various branches up to recent versions (NVD).
The vulnerability is classified as CWE-129 (Improper Validation of Array Index) with a CVSS v3.1 base score of 7.8 (HIGH). The issue occurs in the JFS filesystem's inode management code where the array index validation was insufficient in the diFree function. The fix involves adding proper bounds checking for the 'agno' (allocation group number) variable to prevent out-of-bounds access (Kernel Patch).
The vulnerability could potentially lead to system instability or crashes when accessing JFS filesystems. Given the CVSS score of 7.8, it has the potential for high impacts on confidentiality, integrity, and availability of the affected systems (NVD).
The vulnerability has been patched in multiple Linux kernel versions. Ubuntu has released fixes for various versions including 24.04 LTS (6.8.0-48.48), 22.04 LTS (5.15.0-125.135), 20.04 LTS (5.4.0-200.220), and 18.04 LTS (4.15.0-230.242). Debian has also released fixes for bullseye (5.10.234-1) and bookworm (6.1.128-1) (Ubuntu Security, Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."