CVE-2024-42094

In the Linux kernel, the following vulnerability has been resolved: net/iucv: Avoid explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack is not recommended since it can cause potential stack overflow. Instead, kernel code should always use *cpumask_var API(s) to allocate cpumask var in config-neutral way, leaving allocation strategy to CONFIG_CPUMASK_OFFSTACK. Use *cpumask_var API(s) to address it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

27 Aug 2024, 14:07

Type Values Removed Values Added
CWE CWE-787
References () https://git.kernel.org/stable/c/0af718a690acc089aa1bbb95a93df833d864ef53 - () https://git.kernel.org/stable/c/0af718a690acc089aa1bbb95a93df833d864ef53 - Patch
References () https://git.kernel.org/stable/c/2b085521be5292016097b5e7ca81b26be3f7098d - () https://git.kernel.org/stable/c/2b085521be5292016097b5e7ca81b26be3f7098d - Patch
References () https://git.kernel.org/stable/c/2d090c7f7be3b26fcb80ac04d08a4a8062b1d959 - () https://git.kernel.org/stable/c/2d090c7f7be3b26fcb80ac04d08a4a8062b1d959 - Patch
References () https://git.kernel.org/stable/c/724e7965af054079242b8d6f7e50ee226730a756 - () https://git.kernel.org/stable/c/724e7965af054079242b8d6f7e50ee226730a756 - Patch
References () https://git.kernel.org/stable/c/842afb47d84536fc976fece8fb6c54bea711ad1a - () https://git.kernel.org/stable/c/842afb47d84536fc976fece8fb6c54bea711ad1a - Patch
References () https://git.kernel.org/stable/c/9dadab0db7d904413ea1cdaa13f127da05c31e71 - () https://git.kernel.org/stable/c/9dadab0db7d904413ea1cdaa13f127da05c31e71 - Patch
References () https://git.kernel.org/stable/c/be4e1304419c99a164b4c0e101c7c2a756b635b9 - () https://git.kernel.org/stable/c/be4e1304419c99a164b4c0e101c7c2a756b635b9 - Patch
References () https://git.kernel.org/stable/c/d85ca8179a54ff8cf1e1f8c3c9e3799831319bae - () https://git.kernel.org/stable/c/d85ca8179a54ff8cf1e1f8c3c9e3799831319bae - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

30 Jul 2024, 13:33

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: net/iucv: evite la asignación explícita de la variable cpumask en la pila. Para el kernel CONFIG_CPUMASK_OFFSTACK=y, no se recomienda la asignación explícita de la variable cpumask en la pila, ya que puede causar un posible desbordamiento de la pila. En su lugar, el código del kernel siempre debe usar las API *cpumask_var para asignar cpumask var de manera neutral en cuanto a configuración, dejando la estrategia de asignación a CONFIG_CPUMASK_OFFSTACK. Utilice las API *cpumask_var para solucionarlo.

29 Jul 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 18:15

Updated : 2024-08-27 14:07


NVD link : CVE-2024-42094

Mitre link : CVE-2024-42094

CVE.ORG link : CVE-2024-42094


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write