Executive Summary

Informations
Name CVE-2024-42102 First vendor Publication 2024-07-30
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 4.7
Base Score 4.7 Environmental Score 4.7
impact SubScore 3.6 Temporal Score 4.7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"

Patch series "mm: Avoid possible overflows in dirty throttling".

Dirty throttling logic assumes dirty limits in page units fit into 32-bits. This patch series makes sure this is true (see patch 2/2 for more details).

This patch (of 2):

This reverts commit 9319b647902cbd5cc884ac08a8a6d54ce111fc78.

The commit is broken in several ways. Firstly, the removed (u64) cast from the multiplication will introduce a multiplication overflow on 32-bit archs if wb_thresh * bg_thresh >= 1<<32 (which is actually common - the default settings with 4GB of RAM will trigger this). Secondly, the div64_u64() is unnecessarily expensive on 32-bit archs. We have div64_ul() in case we want to be safe & cheap. Thirdly, if dirty thresholds are larger than 1<<32 pages, then dirty balancing is going to blow up in many other spectacular ways anyway so trying to fix one possible overflow is just moot.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-369 Divide By Zero

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3635

Sources (Detail)

https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec
https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c
https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807
https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a
https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59
https://git.kernel.org/stable/c/30139c702048f1097342a31302cbd3d478f50c63
https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00
https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Date Informations
2025-01-08 03:04:05
  • Multiple Updates
2025-01-07 03:03:37
  • Multiple Updates
2024-12-25 03:02:15
  • Multiple Updates
2024-12-12 03:05:13
  • Multiple Updates
2024-11-25 09:23:19
  • Multiple Updates
2024-11-22 21:22:33
  • Multiple Updates
2024-11-21 21:22:05
  • Multiple Updates
2024-11-20 02:58:50
  • Multiple Updates
2024-11-14 02:59:08
  • Multiple Updates
2024-11-09 02:59:09
  • Multiple Updates
2024-10-26 02:56:33
  • Multiple Updates
2024-10-25 02:58:27
  • Multiple Updates
2024-10-23 02:57:40
  • Multiple Updates
2024-10-03 02:52:59
  • Multiple Updates
2024-10-02 02:51:23
  • Multiple Updates
2024-09-20 00:27:52
  • Multiple Updates
2024-09-15 02:49:05
  • Multiple Updates
2024-09-12 02:48:38
  • Multiple Updates
2024-09-07 02:47:37
  • Multiple Updates
2024-09-06 02:46:47
  • Multiple Updates
2024-09-04 02:49:59
  • Multiple Updates
2024-08-22 02:48:30
  • Multiple Updates
2024-08-22 00:27:45
  • Multiple Updates
2024-07-30 17:27:23
  • Multiple Updates
2024-07-30 13:27:27
  • First insertion