Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-46688— erofs: fix out-of-bound access when z_erofs_gbuf_growsize() partially fails

EPSS 0.05% · P16
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-46688

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
erofs: fix out-of-bound access when z_erofs_gbuf_growsize() partially fails
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: erofs: fix out-of-bound access when z_erofs_gbuf_growsize() partially fails If z_erofs_gbuf_growsize() partially fails on a global buffer due to memory allocation failure or fault injection (as reported by syzbot [1]), new pages need to be freed by comparing to the existing pages to avoid memory leaks. However, the old gbuf->pages[] array may not be large enough, which can lead to null-ptr-deref or out-of-bound access. Fix this by checking against gbuf->nrpages in advance. [1] https://lore.kernel.org/r/000000000000f7b96e062018c6e3@google.com
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于在z_erofs_gbuf_growsize函数部分失败时未能正确释放新页面,可能导致内存泄漏或越界访问。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux d6db47e571dcaecaeaafa8840d00ae849ae3907b ~ 49c0e081998008cde0c872c0ff9affa1ece4b878 -
LinuxLinux 6.10 -

II. Public POCs for CVE-2024-46688

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-46688

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-09-13 · 40 CVEs total

CVE-2024-46704workqueue: Fix spruious data race in __flush_work()
CVE-2024-46694drm/amd/display: avoid using null object of framebuffer
CVE-2024-46696nfsd: fix potential UAF in nfsd4_cb_getattr_release
CVE-2024-46695selinux,smack: don't bypass permissions check in inode_setsecctx hook
CVE-2024-46698video/aperture: optionally match the device in sysfb_disable()
CVE-2024-46697nfsd: ensure that nfsd4_fattr_args.context is zeroed out
CVE-2024-46699drm/v3d: Disable preemption while updating GPU stats
CVE-2024-46701libfs: fix infinite directory reads for offset dir
CVE-2024-46702thunderbolt: Mark XDomain as unplugged when router is removed
CVE-2024-46703Revert "serial: 8250_omap: Set the console genpd always on if no console suspend"
CVE-2024-46692firmware: qcom: scm: Mark get_wq_ctx() as atomic call
CVE-2024-46705drm/xe: reset mmio mappings with devm
CVE-2024-46706tty: serial: fsl_lpuart: mark last busy before uart_add_one_port
CVE-2024-46707KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3
CVE-2024-46709drm/vmwgfx: Fix prime with external buffers
CVE-2024-46708pinctrl: qcom: x1e80100: Fix special pin offsets
CVE-2024-46710drm/vmwgfx: Prevent unmapping active read buffers
CVE-2024-46711mptcp: pm: fix ID 0 endp usage after multiple re-creations
CVE-2024-46712drm/vmwgfx: Disable coherent dumb buffers without 3d
CVE-2024-46713perf/aux: Fix AUX buffer serialization

Showing top 20 of 40 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-46688

No comments yet


Leave a comment