CVE-2024-45021

In the Linux kernel, the following vulnerability has been resolved: memcg_write_event_control(): fix a user-triggerable oops we are *not* guaranteed that anything past the terminating NUL is mapped (let alone initialized with anything sane).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*

History

13 Sep 2024, 16:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/046667c4d3196938e992fba0dfcde570aa85cd0e - () https://git.kernel.org/stable/c/046667c4d3196938e992fba0dfcde570aa85cd0e - Patch
References () https://git.kernel.org/stable/c/0fbe2a72e853a1052abe9bc2b7df8ddb102da227 - () https://git.kernel.org/stable/c/0fbe2a72e853a1052abe9bc2b7df8ddb102da227 - Patch
References () https://git.kernel.org/stable/c/1b37ec85ad95b612307627758c6018cd9d92cca8 - () https://git.kernel.org/stable/c/1b37ec85ad95b612307627758c6018cd9d92cca8 - Patch
References () https://git.kernel.org/stable/c/21b578f1d599edb87462f11113c5b0fc7a04ac61 - () https://git.kernel.org/stable/c/21b578f1d599edb87462f11113c5b0fc7a04ac61 - Patch
References () https://git.kernel.org/stable/c/43768fa80fd192558737e24ed6548f74554611d7 - () https://git.kernel.org/stable/c/43768fa80fd192558737e24ed6548f74554611d7 - Patch
References () https://git.kernel.org/stable/c/ad149f5585345e383baa65f1539d816cd715fd3b - () https://git.kernel.org/stable/c/ad149f5585345e383baa65f1539d816cd715fd3b - Patch
References () https://git.kernel.org/stable/c/f1aa7c509aa766080db7ab3aec2e31b1df09e57c - () https://git.kernel.org/stable/c/f1aa7c509aa766080db7ab3aec2e31b1df09e57c - Patch
References () https://git.kernel.org/stable/c/fa5bfdf6cb5846a00e712d630a43e3cf55ccb411 - () https://git.kernel.org/stable/c/fa5bfdf6cb5846a00e712d630a43e3cf55ccb411 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: memcg_write_event_control(): corrige un error que puede ser activado por el usuario. Oops, *no* tenemos garantía de que todo lo que esté más allá del NUL de terminación se asigne (y mucho menos se inicialice con algo sensato).
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476

11 Sep 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-11 16:15

Updated : 2024-09-13 16:36


NVD link : CVE-2024-45021

Mitre link : CVE-2024-45021

CVE.ORG link : CVE-2024-45021


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference