Lucene search

K
cveLinuxCVE-2024-43890
HistoryAug 26, 2024 - 11:15 a.m.

CVE-2024-43890

2024-08-2611:15:04
CWE-190
Linux
web.nvd.nist.gov
37
linux kernel
vulnerability
tracing feature
overflow
cpu hang

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix overflow in get_free_elt()

“tracing_map->next_elt” in get_free_elt() is at risk of overflowing.

Once it overflows, new elements can still be inserted into the tracing_map
even though the maximum number of elements (max_elts) has been reached.
Continuing to insert elements after the overflow could result in the
tracing_map containing “tracing_map->max_size” elements, leaving no empty
entries.
If any attempt is made to insert an element into a full tracing_map using
__tracing_map_insert(), it will cause an infinite loop with preemption
disabled, leading to a CPU hang problem.

Fix this by preventing any further increments to “tracing_map->next_elt”
once it reaches “tracing_map->max_elt”.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange4.74.19.320
OR
linuxlinux_kernelRange4.205.4.282
OR
linuxlinux_kernelRange5.55.10.224
OR
linuxlinux_kernelRange5.115.15.165
OR
linuxlinux_kernelRange5.166.1.105
OR
linuxlinux_kernelRange6.26.6.46
OR
linuxlinux_kernelRange6.76.10.5
OR
linuxlinux_kernelMatch6.11rc1
OR
linuxlinux_kernelMatch6.11rc2
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel6.11cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
linuxlinux_kernel6.11cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "kernel/trace/tracing_map.c"
    ],
    "versions": [
      {
        "version": "08d43a5fa063",
        "lessThan": "302ceb625d7b",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "08d43a5fa063",
        "lessThan": "d3e4dbc2858f",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "08d43a5fa063",
        "lessThan": "eb223bf01e68",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "08d43a5fa063",
        "lessThan": "cd10d186a540",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "08d43a5fa063",
        "lessThan": "788ea62499b3",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "08d43a5fa063",
        "lessThan": "a172c7b22bc2",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "08d43a5fa063",
        "lessThan": "236bb4690773",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "08d43a5fa063",
        "lessThan": "bcf86c01ca46",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "kernel/trace/tracing_map.c"
    ],
    "versions": [
      {
        "version": "4.7",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "4.7",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.320",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.282",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.224",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.165",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.105",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.46",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10.5",
        "lessThanOrEqual": "6.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.11",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

High

EPSS

0

Percentile

5.1%