CVE-2024-53145

In the Linux kernel, the following vulnerability has been resolved: um: Fix potential integer overflow during physmem setup This issue happens when the real map size is greater than LONG_MAX, which can be easily triggered on UML/i386.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

07 Jan 2025, 16:14

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: um: corrige el posible desbordamiento de enteros durante la configuración de physmem. Este problema ocurre cuando el tamaño real del mapa es mayor que LONG_MAX, lo que se puede activar fácilmente en UML/i386.
References () https://git.kernel.org/stable/c/1575df968650d11771359e5ac78278c5b0cc19f3 - () https://git.kernel.org/stable/c/1575df968650d11771359e5ac78278c5b0cc19f3 - Patch
References () https://git.kernel.org/stable/c/1bd118c5f887802cef2d9ba0d1917258667f1cae - () https://git.kernel.org/stable/c/1bd118c5f887802cef2d9ba0d1917258667f1cae - Patch
References () https://git.kernel.org/stable/c/5c710f45811e7e2bfcf703980c306f19c7e1ecfe - () https://git.kernel.org/stable/c/5c710f45811e7e2bfcf703980c306f19c7e1ecfe - Patch
References () https://git.kernel.org/stable/c/a875c023155ea92b75d6323977003e64d92ae7fc - () https://git.kernel.org/stable/c/a875c023155ea92b75d6323977003e64d92ae7fc - Patch
References () https://git.kernel.org/stable/c/a98b7761f697e590ed5d610d87fa12be66f23419 - () https://git.kernel.org/stable/c/a98b7761f697e590ed5d610d87fa12be66f23419 - Patch
References () https://git.kernel.org/stable/c/a9c95f787b88b29165563fd97761032db77116e7 - () https://git.kernel.org/stable/c/a9c95f787b88b29165563fd97761032db77116e7 - Patch
References () https://git.kernel.org/stable/c/d1a211e5210d31da8f49fc0021bf7129b726468c - () https://git.kernel.org/stable/c/d1a211e5210d31da8f49fc0021bf7129b726468c - Patch
References () https://git.kernel.org/stable/c/e6102b72edc4eb8c0858df00ba74b5ce579c8fa2 - () https://git.kernel.org/stable/c/e6102b72edc4eb8c0858df00ba74b5ce579c8fa2 - Patch
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-190
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

24 Dec 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-24 12:15

Updated : 2025-01-07 16:14


NVD link : CVE-2024-53145

Mitre link : CVE-2024-53145

CVE.ORG link : CVE-2024-53145


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound