CVE-2024-58017

In the Linux kernel, the following vulnerability has been resolved: printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX Shifting 1 << 31 on a 32-bit int causes signed integer overflow, which leads to undefined behavior. To prevent this, cast 1 to u32 before performing the shift, ensuring well-defined behavior. This change explicitly avoids any potential overflow by ensuring that the shift occurs on an unsigned 32-bit integer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/54c14022fa2ba427dc543455c2cf9225903a7174 -
  • () https://git.kernel.org/stable/c/bb8ff054e19fe27f4e5eaac1b05e462894cfe9b1 -
  • () https://git.kernel.org/stable/c/dfb7b179741ee09506dc7719d92f9e1cea01f10e -

06 Mar 2025, 12:21

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3d6f83df8ff2d5de84b50377e4f0d45e25311c7a - () https://git.kernel.org/stable/c/3d6f83df8ff2d5de84b50377e4f0d45e25311c7a - Patch
References () https://git.kernel.org/stable/c/404e5fd918a0b14abec06c7eca128f04c9b98e41 - () https://git.kernel.org/stable/c/404e5fd918a0b14abec06c7eca128f04c9b98e41 - Patch
References () https://git.kernel.org/stable/c/4a2c4e7265b8eed83c25d86d702cea06493cab18 - () https://git.kernel.org/stable/c/4a2c4e7265b8eed83c25d86d702cea06493cab18 - Patch
References () https://git.kernel.org/stable/c/4acf6bab775dbd22a9a799030a808a7305e01d63 - () https://git.kernel.org/stable/c/4acf6bab775dbd22a9a799030a808a7305e01d63 - Patch
References () https://git.kernel.org/stable/c/9a6d43844de2479a3ff8d674c3e2a16172e01598 - () https://git.kernel.org/stable/c/9a6d43844de2479a3ff8d674c3e2a16172e01598 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-190
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: printk: Se corrige el desbordamiento de entero con signo al definir LOG_BUF_LEN_MAX. El cambio de 1 &lt;&lt; 31 en un entero de 32 bits provoca un desbordamiento de entero con signo, lo que conduce a un comportamiento indefinido. Para evitarlo, convierta 1 a u32 antes de realizar el cambio, lo que garantiza un comportamiento bien definido. Este cambio evita explícitamente cualquier desbordamiento potencial al garantizar que el cambio se produzca en un entero de 32 bits sin signo.

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-03-13 13:15


NVD link : CVE-2024-58017

Mitre link : CVE-2024-58017

CVE.ORG link : CVE-2024-58017


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound