VYPR
Medium severity5.5NVD Advisory· Published Jul 29, 2024· Updated May 12, 2026

CVE-2024-41016

CVE-2024-41016

Description

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()

xattr in ocfs2 maybe 'non-indexed', which saved with additional space requested. It's better to check if the memory is out of bound before memcmp, although this possibility mainly comes from crafted poisonous images.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An out-of-bounds read vulnerability in the Linux kernel's ocfs2 filesystem could allow a local attacker to read kernel memory via crafted poisoned images.

Vulnerability

Overview

A vulnerability in the Linux kernel's ocfs2 filesystem, tracked as CVE-2024-41016, arises in the ocfs2_xattr_find_entry() function. The flaw is a missing strict bound check before a memcmp operation when handling non-indexed extended attributes. Non-indexed xattr entries are stored with additional space, and without proper bounds checking, a memory read beyond the allocated region can occur, potentially leaking sensitive kernel memory.

Exploitation

Details

Exploitation requires local access to the system and the ability to mount or access a maliciously crafted ocfs2 filesystem image. The attacker must supply a poisoned image that provides carefully sized xattr data to trigger an out-of-bounds read during the memcmp comparison. The official description notes that while the primary risk comes from such crafted images, the possibility of exploitation in normal operation is low, but the fix eliminates it entirely [1].

Impact

A successful exploit could allow a local attacker to read kernel memory contents, potentially leaking sensitive information such as other users' data or cryptographic keys. The severity is rated as Medium (CVSS v3.1 5.5) due to the requirement for local access and the need for a crafted filesystem image.

Mitigation

The vulnerability has been patched in the Linux kernel. The fix introduces a strict bound check before the memcmp operation, ensuring that no out-of-bounds memory access can occur. Users should apply kernel updates from their distribution vendors. Siemens has listed this CVE as affecting its SIMATIC S7-1500 TM MFP GNU/Linux subsystem and recommends updating [1].

References
  1. SSA-265688

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

148

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

11

News mentions

0

No linked articles in our index yet.