Executive Summary

Informations
Name CVE-2024-47674 First vendor Publication 2024-10-15
Vendor Cve Last vendor Modification 2024-11-17

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

mm: avoid leaving partial pfn mappings around in error case

As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'.

That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors. Yes, a failed mmap() will always eventually clean up any partial mappings, but without any explicit lifetime in the page table mapping itself, it's very easy to do the error handling in the wrong order.

In particular, it's easy to mistakenly free the physical backing store before the page tables are actually cleaned up and (temporarily) have stale dangling PTE entries.

To make this situation less error-prone, just make sure that any partial pfn mapping is torn down early, before any other error handling.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47674

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-459 Incomplete Cleanup

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3634

Sources (Detail)

https://git.kernel.org/stable/c/3213fdcab961026203dd587a4533600c70b3336b
https://git.kernel.org/stable/c/35770ca6180caa24a2b258c99a87bd437a1ee10f
https://git.kernel.org/stable/c/5b2c8b34f6d76bfbd1dd4936eb8a0fbfb9af3959
https://git.kernel.org/stable/c/65d0db500d7c07f0f76fc24a4d837791c4862cd2
https://git.kernel.org/stable/c/79a61cc3fc0466ad2b7b89618a6157785f0293b3
https://git.kernel.org/stable/c/954fd4c81f22c4b6ba65379a81fd252971bf4ef3
https://git.kernel.org/stable/c/a95a24fcaee1b892e47d5e6dcc403f713874ee80
https://project-zero.issues.chromium.org/issues/366053091
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Date Informations
2024-11-22 21:22:18
  • Multiple Updates
2024-11-22 00:23:12
  • Multiple Updates
2024-11-19 21:21:01
  • Multiple Updates
2024-11-17 21:20:40
  • Multiple Updates
2024-11-13 21:21:57
  • Multiple Updates
2024-11-09 00:28:24
  • Multiple Updates
2024-11-08 21:28:06
  • Multiple Updates
2024-10-26 00:28:56
  • Multiple Updates
2024-10-25 21:29:50
  • Multiple Updates
2024-10-25 00:28:57
  • Multiple Updates
2024-10-24 17:28:03
  • Multiple Updates
2024-10-22 21:28:05
  • Multiple Updates
2024-10-22 00:27:38
  • Multiple Updates
2024-10-18 21:27:33
  • Multiple Updates
2024-10-17 21:27:29
  • Multiple Updates
2024-10-15 17:27:27
  • First insertion