CVE-2024-50270

Severity CVSS v4.0:
Pending analysis
Type:
CWE-190 Integer Overflow or Wraparound
Publication date:
19/11/2024
Last modified:
01/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/damon/core: avoid overflow in damon_feed_loop_next_input()<br /> <br /> damon_feed_loop_next_input() is inefficient and fragile to overflows. <br /> Specifically, &amp;#39;score_goal_diff_bp&amp;#39; calculation can overflow when &amp;#39;score&amp;#39;<br /> is high. The calculation is actually unnecessary at all because &amp;#39;goal&amp;#39; is<br /> a constant of value 10,000. Calculation of &amp;#39;compensation&amp;#39; is again<br /> fragile to overflow. Final calculation of return value for under-achiving<br /> case is again fragile to overflow when the current score is<br /> under-achieving the target.<br /> <br /> Add two corner cases handling at the beginning of the function to make the<br /> body easier to read, and rewrite the body of the function to avoid<br /> overflows and the unnecessary bp value calcuation.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.11.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*