CVE-2024-43890

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix overflow in get_free_elt() "tracing_map->next_elt" in get_free_elt() is at risk of overflowing. Once it overflows, new elements can still be inserted into the tracing_map even though the maximum number of elements (`max_elts`) has been reached. Continuing to insert elements after the overflow could result in the tracing_map containing "tracing_map->max_size" elements, leaving no empty entries. If any attempt is made to insert an element into a full tracing_map using `__tracing_map_insert()`, it will cause an infinite loop with preemption disabled, leading to a CPU hang problem. Fix this by preventing any further increments to "tracing_map->next_elt" once it reaches "tracing_map->max_elt".
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*

History

05 Sep 2024, 18:48

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rastreo: corrige el desbordamiento en get_free_elt() "tracing_map->next_elt" en get_free_elt() corre el riesgo de desbordarse. Una vez que se desborda, aún se pueden insertar nuevos elementos en tracing_map aunque se haya alcanzado el número máximo de elementos (`max_elts`). Continuar insertando elementos después del desbordamiento podría dar como resultado que tracing_map contenga elementos "tracing_map->max_size", sin dejar entradas vacías. Si se intenta insertar un elemento en un tracing_map completo usando `__tracing_map_insert()`, se producirá un bucle infinito con la preferencia deshabilitada, lo que provocará un problema de bloqueo de la CPU. Solucione este problema evitando incrementos adicionales en "tracing_map->next_elt" una vez que llegue a "tracing_map->max_elt".
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/236bb4690773ab6869b40bedc7bc8d889e36f9d6 - () https://git.kernel.org/stable/c/236bb4690773ab6869b40bedc7bc8d889e36f9d6 - Patch
References () https://git.kernel.org/stable/c/302ceb625d7b990db205a15e371f9a71238de91c - () https://git.kernel.org/stable/c/302ceb625d7b990db205a15e371f9a71238de91c - Patch
References () https://git.kernel.org/stable/c/788ea62499b3c18541fd6d621964d8fafbc4aec5 - () https://git.kernel.org/stable/c/788ea62499b3c18541fd6d621964d8fafbc4aec5 - Patch
References () https://git.kernel.org/stable/c/a172c7b22bc2feaf489cfc6d6865f7237134fdf8 - () https://git.kernel.org/stable/c/a172c7b22bc2feaf489cfc6d6865f7237134fdf8 - Patch
References () https://git.kernel.org/stable/c/bcf86c01ca4676316557dd482c8416ece8c2e143 - () https://git.kernel.org/stable/c/bcf86c01ca4676316557dd482c8416ece8c2e143 - Patch
References () https://git.kernel.org/stable/c/cd10d186a5409a1fe6e976df82858e9773a698da - () https://git.kernel.org/stable/c/cd10d186a5409a1fe6e976df82858e9773a698da - Patch
References () https://git.kernel.org/stable/c/d3e4dbc2858fe85d1dbd2e72a9fc5dea988b5c18 - () https://git.kernel.org/stable/c/d3e4dbc2858fe85d1dbd2e72a9fc5dea988b5c18 - Patch
References () https://git.kernel.org/stable/c/eb223bf01e688dfe37e813c8988ee11c8c9f8d0a - () https://git.kernel.org/stable/c/eb223bf01e688dfe37e813c8988ee11c8c9f8d0a - Patch
CWE CWE-190
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*

26 Aug 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-26 11:15

Updated : 2024-09-05 18:48


NVD link : CVE-2024-43890

Mitre link : CVE-2024-43890

CVE.ORG link : CVE-2024-43890


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound