CVE-2024-35827

Severity CVSS v4.0:
Pending analysis
Type:
CWE-190 Integer Overflow or Wraparound
Publication date:
17/05/2024
Last modified:
03/02/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> io_uring/net: fix overflow check in io_recvmsg_mshot_prep()<br /> <br /> The "controllen" variable is type size_t (unsigned long). Casting it<br /> to int could lead to an integer underflow.<br /> <br /> The check_add_overflow() function considers the type of the destination<br /> which is type int. If we add two positive values and the result cannot<br /> fit in an integer then that&amp;#39;s counted as an overflow.<br /> <br /> However, if we cast "controllen" to an int and it turns negative, then<br /> negative values *can* fit into an int type so there is no overflow.<br /> <br /> Good: 100 + (unsigned long)-4 = 96

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.0 (including) 6.1.83 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.23 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.8.2 (excluding)