Lucene search

K
cveLinuxCVE-2024-44947
HistorySep 02, 2024 - 6:15 p.m.

CVE-2024-44947

2024-09-0218:15:36
CWE-665
Linux
web.nvd.nist.gov
32
linux
kernel
vulnerability
fuse
initialization
mmap
security
information leak

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

14.0%

In the Linux kernel, the following vulnerability has been resolved:

fuse: Initialize beyond-EOF page contents before setting uptodate

fuse_notify_store(), unlike fuse_do_readpage(), does not enable page
zeroing (because it can be used to change partial page contents).

So fuse_notify_store() must be more careful to fully initialize page
contents (including parts of the page that are beyond end-of-file)
before marking the page uptodate.

The current code can leave beyond-EOF page contents uninitialized, which
makes these uninitialized page contents visible to userspace via mmap().

This is an information leak, but only affects systems which do not
enable init-on-alloc (via CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y or the
corresponding kernel command line parameter).

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange2.6.364.19.321
OR
linuxlinux_kernelRange4.205.4.283
OR
linuxlinux_kernelRange5.55.10.225
OR
linuxlinux_kernelRange5.115.15.166
OR
linuxlinux_kernelRange5.166.1.107
OR
linuxlinux_kernelRange6.26.6.48
OR
linuxlinux_kernelRange6.76.10.7
OR
linuxlinux_kernelMatch6.11rc1
OR
linuxlinux_kernelMatch6.11rc2
OR
linuxlinux_kernelMatch6.11rc3
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel6.11cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
linuxlinux_kernel6.11cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
linuxlinux_kernel6.11cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "fs/fuse/dev.c"
    ],
    "versions": [
      {
        "version": "a1d75f258230",
        "lessThan": "49934861514d",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a1d75f258230",
        "lessThan": "33168db352c7",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a1d75f258230",
        "lessThan": "4690e2171f65",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a1d75f258230",
        "lessThan": "8c78303eafbf",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a1d75f258230",
        "lessThan": "831433527773",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a1d75f258230",
        "lessThan": "ac42e0f0eb66",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a1d75f258230",
        "lessThan": "18a067240817",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a1d75f258230",
        "lessThan": "3c0da3d163eb",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "fs/fuse/dev.c"
    ],
    "versions": [
      {
        "version": "2.6.36",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "2.6.36",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.321",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.283",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.225",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.166",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.107",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.48",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10.7",
        "lessThanOrEqual": "6.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.11",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

14.0%