CVE-2024-42102

Severity CVSS v4.0:
Pending analysis
Type:
CWE-369 Divide By Zero
Publication date:
30/07/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"<br /> <br /> Patch series "mm: Avoid possible overflows in dirty throttling".<br /> <br /> Dirty throttling logic assumes dirty limits in page units fit into<br /> 32-bits. This patch series makes sure this is true (see patch 2/2 for<br /> more details).<br /> <br /> <br /> This patch (of 2):<br /> <br /> This reverts commit 9319b647902cbd5cc884ac08a8a6d54ce111fc78.<br /> <br /> The commit is broken in several ways. Firstly, the removed (u64) cast<br /> from the multiplication will introduce a multiplication overflow on 32-bit<br /> archs if wb_thresh * bg_thresh &gt;= 1

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.307 (including) 4.19.318 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.269 (including) 5.4.280 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10.210 (including) 5.10.222 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.149 (including) 5.15.163 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.79 (including) 6.1.98 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.18 (including) 6.6.39 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.9.9 (excluding)