CVE-2024-42265

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/08/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> protect the fetch of -&gt;fd[fd] in do_dup2() from mispredictions<br /> <br /> both callers have verified that fd is not greater than -&gt;max_fds;<br /> however, misprediction might end up with<br /> tofree = fdt-&gt;fd[fd];<br /> being speculatively executed. That&amp;#39;s wrong for the same reasons<br /> why it&amp;#39;s wrong in close_fd()/file_close_fd_locked(); the same<br /> solution applies - array_index_nospec(fd, fdt-&gt;max_fds) could differ<br /> from fd only in case of speculative execution on mispredicted path.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.320 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.282 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.224 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.165 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.104 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.45 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.4 (excluding)
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*