CVE-2024-43890
Severity CVSS v4.0: 
            Pending analysis
                                                    Type: 
          
                          CWE-190
                        Integer Overflow or Wraparound
          
        Publication date: 
                          26/08/2024
                  Last modified: 
                          03/11/2025
                  Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tracing: Fix overflow in get_free_elt()<br />
<br />
"tracing_map->next_elt" in get_free_elt() is at risk of overflowing.<br />
<br />
Once it overflows, new elements can still be inserted into the tracing_map<br />
even though the maximum number of elements (`max_elts`) has been reached.<br />
Continuing to insert elements after the overflow could result in the<br />
tracing_map containing "tracing_map->max_size" elements, leaving no empty<br />
entries.<br />
If any attempt is made to insert an element into a full tracing_map using<br />
`__tracing_map_insert()`, it will cause an infinite loop with preemption<br />
disabled, leading to a CPU hang problem.<br />
<br />
Fix this by preventing any further increments to "tracing_map->next_elt"<br />
once it reaches "tracing_map->max_elt".
              Impact
Base Score 3.x
          5.50
        Severity 3.x
          MEDIUM
        Vulnerable products and versions
| CPE | From | Up to | 
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.7 (including) | 4.19.320 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.282 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.224 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.165 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.105 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.46 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.5 (excluding) | 
| cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* | 
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/236bb4690773ab6869b40bedc7bc8d889e36f9d6
 - https://git.kernel.org/stable/c/302ceb625d7b990db205a15e371f9a71238de91c
 - https://git.kernel.org/stable/c/788ea62499b3c18541fd6d621964d8fafbc4aec5
 - https://git.kernel.org/stable/c/a172c7b22bc2feaf489cfc6d6865f7237134fdf8
 - https://git.kernel.org/stable/c/bcf86c01ca4676316557dd482c8416ece8c2e143
 - https://git.kernel.org/stable/c/cd10d186a5409a1fe6e976df82858e9773a698da
 - https://git.kernel.org/stable/c/d3e4dbc2858fe85d1dbd2e72a9fc5dea988b5c18
 - https://git.kernel.org/stable/c/eb223bf01e688dfe37e813c8988ee11c8c9f8d0a
 - https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html
 - https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
 



