CVE-2024-38568

In the Linux kernel, the following vulnerability has been resolved: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group The perf tool allows users to create event groups through following cmd [1], but the driver does not check whether the array index is out of bounds when writing data to the event_group array. If the number of events in an event_group is greater than HNS3_PMU_MAX_HW_EVENTS, the memory write overflow of event_group array occurs. Add array index check to fix the possible array out of bounds violation, and return directly when write new events are written to array bounds. There are 9 different events in an event_group. [1] perf stat -e '{pmu/event1/, ... ,pmu/event9/}
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3669baf308308385a2ab391324abdde5682af5aa - Patch () https://git.kernel.org/stable/c/3669baf308308385a2ab391324abdde5682af5aa - Patch
References () https://git.kernel.org/stable/c/81bdd60a3d1d3b05e6cc6674845afb1694dd3a0e - Patch () https://git.kernel.org/stable/c/81bdd60a3d1d3b05e6cc6674845afb1694dd3a0e - Patch
References () https://git.kernel.org/stable/c/aa2d3d678895c8eedd003f1473f87d3f06fe6ec7 - Patch () https://git.kernel.org/stable/c/aa2d3d678895c8eedd003f1473f87d3f06fe6ec7 - Patch
References () https://git.kernel.org/stable/c/b5120d322763c15c978bc47beb3b6dff45624304 - Patch () https://git.kernel.org/stable/c/b5120d322763c15c978bc47beb3b6dff45624304 - Patch
References () https://git.kernel.org/stable/c/be1fa711e59c874d049f592aef1d4685bdd22bdf - Patch () https://git.kernel.org/stable/c/be1fa711e59c874d049f592aef1d4685bdd22bdf - Patch

19 Sep 2024, 13:24

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
CWE CWE-129
References () https://git.kernel.org/stable/c/3669baf308308385a2ab391324abdde5682af5aa - () https://git.kernel.org/stable/c/3669baf308308385a2ab391324abdde5682af5aa - Patch
References () https://git.kernel.org/stable/c/81bdd60a3d1d3b05e6cc6674845afb1694dd3a0e - () https://git.kernel.org/stable/c/81bdd60a3d1d3b05e6cc6674845afb1694dd3a0e - Patch
References () https://git.kernel.org/stable/c/aa2d3d678895c8eedd003f1473f87d3f06fe6ec7 - () https://git.kernel.org/stable/c/aa2d3d678895c8eedd003f1473f87d3f06fe6ec7 - Patch
References () https://git.kernel.org/stable/c/b5120d322763c15c978bc47beb3b6dff45624304 - () https://git.kernel.org/stable/c/b5120d322763c15c978bc47beb3b6dff45624304 - Patch
References () https://git.kernel.org/stable/c/be1fa711e59c874d049f592aef1d4685bdd22bdf - () https://git.kernel.org/stable/c/be1fa711e59c874d049f592aef1d4685bdd22bdf - Patch

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drivers/perf: hisi: hns3: corrige el acceso fuera de los límites cuando el grupo de eventos es válido. La herramienta perf permite a los usuarios crear grupos de eventos mediante el siguiente cmd [1], pero el controlador no comprueba si el índice de la matriz está fuera de los límites al escribir datos en la matriz event_group. Si el número de eventos en un event_group es mayor que HNS3_PMU_MAX_HW_EVENTS, se produce un desbordamiento de escritura en la memoria de la matriz event_group. Agregue la verificación del índice de la matriz para corregir la posible infracción de la matriz fuera de los límites y regrese directamente cuando se escriban nuevos eventos en los límites de la matriz. Hay 9 eventos diferentes en un grupo de eventos. [1] estadística de rendimiento -e '{pmu/event1/, ...,pmu/event9/}

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2024-11-21 09:26


NVD link : CVE-2024-38568

Mitre link : CVE-2024-38568

CVE.ORG link : CVE-2024-38568


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index