Lucene search

K
cveLinuxCVE-2024-42259
HistoryAug 14, 2024 - 3:15 p.m.

CVE-2024-42259

2024-08-1415:15:31
CWE-131
Linux
web.nvd.nist.gov
30
linux kernel
vulnerability
virtual memory mapping
calculation
page fault access

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gem: Fix Virtual Memory mapping boundaries calculation

Calculating the size of the mapped area as the lesser value
between the requested size and the actual size does not consider
the partial mapping offset. This can cause page fault access.

Fix the calculation of the starting and ending addresses, the
total size is now deduced from the difference between the end and
start addresses.

Additionally, the calculations have been rewritten in a clearer
and more understandable form.

[Joonas: Add Requires: tag]
Requires: 60a2066c5005 (“drm/i915/gem: Adjust vma offset for framebuffer mmap offset”)
(cherry picked from commit 97b6784753da06d9d40232328efc5c5367e53417)

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange4.94.19.320
OR
linuxlinux_kernelRange4.205.4.282
OR
linuxlinux_kernelRange5.55.10.224
OR
linuxlinux_kernelRange5.115.15.165
OR
linuxlinux_kernelRange5.166.1.106
OR
linuxlinux_kernelRange6.26.6.46
OR
linuxlinux_kernelRange6.76.10.5
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/gpu/drm/i915/gem/i915_gem_mman.c"
    ],
    "versions": [
      {
        "version": "c58305af1835",
        "lessThan": "3e06073d2480",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c58305af1835",
        "lessThan": "a256d019eaf0",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c58305af1835",
        "lessThan": "50111a8098fb",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c58305af1835",
        "lessThan": "911f8055f175",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c58305af1835",
        "lessThan": "e8a68aa842d3",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c58305af1835",
        "lessThan": "4b09513ce93b",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c58305af1835",
        "lessThan": "ead9289a51ea",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c58305af1835",
        "lessThan": "8bdd9ef7e9b1",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/gpu/drm/i915/gem/i915_gem_mman.c"
    ],
    "versions": [
      {
        "version": "4.9",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "4.9",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.320",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.282",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.224",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.165",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.106",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.46",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10.5",
        "lessThanOrEqual": "6.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.11",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

High

EPSS

0

Percentile

5.1%