๐Ÿ” CVE Alert

CVE-2024-49900

UNKNOWN 0.0

jfs: Fix uninit-value access of new_ea in ea_buffer

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: jfs: Fix uninit-value access of new_ea in ea_buffer syzbot reports that lzo1x_1_do_compress is using uninit-value: ===================================================== BUG: KMSAN: uninit-value in lzo1x_1_do_compress+0x19f9/0x2510 lib/lzo/lzo1x_compress.c:178 ... Uninit was stored to memory at: ea_put fs/jfs/xattr.c:639 [inline] ... Local variable ea_buf created at: __jfs_setxattr+0x5d/0x1ae0 fs/jfs/xattr.c:662 __jfs_xattr_set+0xe6/0x1f0 fs/jfs/xattr.c:934 ===================================================== The reason is ea_buf->new_ea is not initialized properly. Fix this by using memset to empty its content at the beginning in ea_get().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 7b24d41d47a6805c45378debf8bd115675d41da8 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < dac398ed272a378d2f42ac68ae408333a51baf52 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 8b1dcf25c26d42e4a68c4725ce52a0543c7878cc 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < d7444f91a9f93eaa48827087ed0f3381c194181d 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 6041536d18c5f51a84bc37cd568cbab61870031e 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < c076b3746224982eebdba5c9e4b1467e146c0d64 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 7c244d5b48284a770d96ff703df2dfeadf804a73 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 8ad8b531de79c348bcb8133e7f5e827b884226af 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2b59ffad47db1c46af25ccad157bb3b25147c35c
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7b24d41d47a6805c45378debf8bd115675d41da8 git.kernel.org: https://git.kernel.org/stable/c/dac398ed272a378d2f42ac68ae408333a51baf52 git.kernel.org: https://git.kernel.org/stable/c/8b1dcf25c26d42e4a68c4725ce52a0543c7878cc git.kernel.org: https://git.kernel.org/stable/c/d7444f91a9f93eaa48827087ed0f3381c194181d git.kernel.org: https://git.kernel.org/stable/c/6041536d18c5f51a84bc37cd568cbab61870031e git.kernel.org: https://git.kernel.org/stable/c/c076b3746224982eebdba5c9e4b1467e146c0d64 git.kernel.org: https://git.kernel.org/stable/c/7c244d5b48284a770d96ff703df2dfeadf804a73 git.kernel.org: https://git.kernel.org/stable/c/8ad8b531de79c348bcb8133e7f5e827b884226af git.kernel.org: https://git.kernel.org/stable/c/2b59ffad47db1c46af25ccad157bb3b25147c35c lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html