U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-42131 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: mm: avoid overflows in dirty throttling logic The dirty throttling logic is interspersed with assumptions that dirty limits in PAGE_SIZE units fit into 32-bit (so that various multiplications fit into 64-bits). If limits end up being larger, we will hit overflows, possible divisions by 0 etc. Fix these problems by never allowing so large dirty limits as they have dubious practical value anyway. For dirty_bytes / dirty_background_bytes interfaces we can just refuse to set so large limits. For dirty_ratio / dirty_background_ratio it isn't so simple as the dirty limit is computed from the amount of available memory which can change due to memory hotplug etc. So when converting dirty limits from ratios to numbers of pages, we just don't allow the result to exceed UINT_MAX. This is root-only triggerable problem which occurs when the operator sets dirty limits to >16 TB.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/2b2d2b8766db028bd827af34075f221ae9e9efff Patch 
https://git.kernel.org/stable/c/385d838df280eba6c8680f9777bfa0d0bfe7e8b2 Patch 
https://git.kernel.org/stable/c/4d3817b64eda07491bdd86a234629fe0764fb42a Patch 
https://git.kernel.org/stable/c/7a49389771ae7666f4dc3426e2a4594bf23ae290 Patch 
https://git.kernel.org/stable/c/8e0b5e7f2895eccef5c2a0018b589266f90c4805 Patch 
https://git.kernel.org/stable/c/a25e8536184516b55ef89ab91dd2eea429de28d2 Patch 
https://git.kernel.org/stable/c/bd16a7ee339aef3ee4c90cb23902afb6af379ea0 Patch 
https://git.kernel.org/stable/c/c83ed422c24f0d4b264f89291d4fabe285f80dbc Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-190 Integer Overflow or Wraparound cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

4 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-42131
NVD Published Date:
07/30/2024
NVD Last Modified:
09/25/2024
Source:
kernel.org