CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
EPSS
Percentile
9.5%
In the Linux kernel, the following vulnerability has been resolved:
mmc: sdhci: Fix max_seg_size for 64KiB PAGE_SIZE
blk_queue_max_segment_size() ensured:
if (max_size < PAGE_SIZE)
max_size = PAGE_SIZE;
whereas:
blk_validate_limits() makes it an error:
if (WARN_ON_ONCE(lim->max_segment_size < PAGE_SIZE))
return -EINVAL;
The change from one to the other, exposed sdhci which was setting maximum
segment size too low in some circumstances.
Fix the maximum segment size when it is too low.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux-bluefield | < any | UNKNOWN |
git.kernel.org/linus/63d20a94f24fc1cbaf44d0e7c0e0a8077fde0aef (6.10)
git.kernel.org/stable/c/63d20a94f24fc1cbaf44d0e7c0e0a8077fde0aef
git.kernel.org/stable/c/bf78b1accef46efd9b624967cb74ae8d3c215a2b
launchpad.net/bugs/cve/CVE-2024-42242
nvd.nist.gov/vuln/detail/CVE-2024-42242
security-tracker.debian.org/tracker/CVE-2024-42242
www.cve.org/CVERecord?id=CVE-2024-42242