CVE-2024-44966

In the Linux kernel, the following vulnerability has been resolved: binfmt_flat: Fix corruption when not offsetting data start Commit 04d82a6d0881 ("binfmt_flat: allow not offsetting data start") introduced a RISC-V specific variant of the FLAT format which does not allocate any space for the (obsolete) array of shared library pointers. However, it did not disable the code which initializes the array, resulting in the corruption of sizeof(long) bytes before the DATA segment, generally the end of the TEXT segment. Introduce MAX_SHARED_LIBS_UPDATE which depends on the state of CONFIG_BINFMT_FLAT_NO_DATA_START_OFFSET to guard the initialization of the shared library pointer region so that it will only be initialized if space is reserved for it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*

History

04 Oct 2024, 16:15

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3a684499261d0f7ed5ee72793025c88c2276809c - () https://git.kernel.org/stable/c/3a684499261d0f7ed5ee72793025c88c2276809c - Patch
References () https://git.kernel.org/stable/c/3eb3cd5992f7a0c37edc8d05b4c38c98758d8671 - () https://git.kernel.org/stable/c/3eb3cd5992f7a0c37edc8d05b4c38c98758d8671 - Patch
References () https://git.kernel.org/stable/c/49df34d2b7da9e57c839555a2f7877291ce45ad1 - () https://git.kernel.org/stable/c/49df34d2b7da9e57c839555a2f7877291ce45ad1 - Patch
References () https://git.kernel.org/stable/c/9350ba06ee61db392c486716ac68ecc20e030f7c - () https://git.kernel.org/stable/c/9350ba06ee61db392c486716ac68ecc20e030f7c - Patch
References () https://git.kernel.org/stable/c/af65d5383854cc3f172a7d0843b628758bf462c8 - () https://git.kernel.org/stable/c/af65d5383854cc3f172a7d0843b628758bf462c8 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

05 Sep 2024, 12:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: binfmt_flat: Se corrige la corrupción cuando no se compensa el inicio de los datos. El commit 04d82a6d0881 ("binfmt_flat: permitir no compensar el inicio de los datos") introdujo una variante específica de RISC-V del formato FLAT que no asigna ningún espacio para la matriz (obsoleta) de punteros de librería compartida. Sin embargo, no deshabilitó el código que inicializa la matriz, lo que resultó en la corrupción de sizeof(long) bytes antes del segmento DATA, generalmente el final del segmento TEXT. Introduzca MAX_SHARED_LIBS_UPDATE que depende del estado de CONFIG_BINFMT_FLAT_NO_DATA_START_OFFSET para proteger la inicialización de la región del puntero de la librería compartida de modo que solo se inicialice si se reserva espacio para ella.

04 Sep 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-04 19:15

Updated : 2024-10-04 16:15


NVD link : CVE-2024-44966

Mitre link : CVE-2024-44966

CVE.ORG link : CVE-2024-44966


JSON object : View

Products Affected

linux

  • linux_kernel