| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinfmt_flat: Fix integer overflow bug on 32 bit systems\n\nMost of these sizes and counts are capped at 256MB so the math doesn't\nresult in an integer overflow. The \"relocs\" count needs to be checked\nas well. Otherwise on 32bit systems the calculation of \"full_data\"\ncould be wrong.\n\n\tfull_data = data_len + relocs * sizeof(unsigned long);" |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "fs/binfmt_flat.c" |
| ], |
| "versions": [ |
| { |
| "version": "c995ee28d29d6f256c3a8a6c4e66469554374f25", |
| "lessThan": "0b6be54d7386b7addbf9e5947366f94aad046938", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c995ee28d29d6f256c3a8a6c4e66469554374f25", |
| "lessThan": "6fb98e0576ea155267e206286413dcb3a3d55c12", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c995ee28d29d6f256c3a8a6c4e66469554374f25", |
| "lessThan": "bc8ca18b8ef4648532c001bd6c8151143b569275", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c995ee28d29d6f256c3a8a6c4e66469554374f25", |
| "lessThan": "95506c7f33452450346fbe2975c1359100f854ca", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c995ee28d29d6f256c3a8a6c4e66469554374f25", |
| "lessThan": "d17ca8f2dfcf423c439859995910a20e38b86f00", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c995ee28d29d6f256c3a8a6c4e66469554374f25", |
| "lessThan": "a009378af674b808efcca1e2e67916e79ce866b3", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c995ee28d29d6f256c3a8a6c4e66469554374f25", |
| "lessThan": "8e8cd712bb06a507b26efd2a56155076aa454345", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "c995ee28d29d6f256c3a8a6c4e66469554374f25", |
| "lessThan": "55cf2f4b945f6a6416cc2524ba740b83cc9af25a", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "fs/binfmt_flat.c" |
| ], |
| "versions": [ |
| { |
| "version": "4.8", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "4.8", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.4.291", |
| "lessThanOrEqual": "5.4.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.10.235", |
| "lessThanOrEqual": "5.10.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.179", |
| "lessThanOrEqual": "5.15.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1.129", |
| "lessThanOrEqual": "6.1.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.6.78", |
| "lessThanOrEqual": "6.6.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.12.14", |
| "lessThanOrEqual": "6.12.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.13.3", |
| "lessThanOrEqual": "6.13.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.14", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.8", |
| "versionEndExcluding": "5.4.291" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.8", |
| "versionEndExcluding": "5.10.235" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.8", |
| "versionEndExcluding": "5.15.179" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.8", |
| "versionEndExcluding": "6.1.129" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.8", |
| "versionEndExcluding": "6.6.78" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.8", |
| "versionEndExcluding": "6.12.14" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.8", |
| "versionEndExcluding": "6.13.3" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "4.8", |
| "versionEndExcluding": "6.14" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/0b6be54d7386b7addbf9e5947366f94aad046938" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/6fb98e0576ea155267e206286413dcb3a3d55c12" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/bc8ca18b8ef4648532c001bd6c8151143b569275" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/95506c7f33452450346fbe2975c1359100f854ca" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/d17ca8f2dfcf423c439859995910a20e38b86f00" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/a009378af674b808efcca1e2e67916e79ce866b3" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/8e8cd712bb06a507b26efd2a56155076aa454345" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/55cf2f4b945f6a6416cc2524ba740b83cc9af25a" |
| } |
| ], |
| "title": "binfmt_flat: Fix integer overflow bug on 32 bit systems", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2024-58010", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |