GHSA-X5Q6-QHM7-QG95
Vulnerability from github – Published: 2024-07-30 09:32 – Updated: 2024-07-30 09:32
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
orangefs: fix out-of-bounds fsid access
Arnd Bergmann sent a patch to fsdevel, he says:
"orangefs_statfs() copies two consecutive fields of the superblock into the statfs structure, which triggers a warning from the string fortification helpers"
Jan Kara suggested an alternate way to do the patch to make it more readable.
I ran both ideas through xfstests and both seem fine. This patch is based on Jan Kara's suggestion.
{
"affected": [],
"aliases": [
"CVE-2024-42143"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-30T08:15:06Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\norangefs: fix out-of-bounds fsid access\n\nArnd Bergmann sent a patch to fsdevel, he says:\n\n\"orangefs_statfs() copies two consecutive fields of the superblock into\nthe statfs structure, which triggers a warning from the string fortification\nhelpers\"\n\nJan Kara suggested an alternate way to do the patch to make it more readable.\n\nI ran both ideas through xfstests and both seem fine. This patch\nis based on Jan Kara\u0027s suggestion.",
"id": "GHSA-x5q6-qhm7-qg95",
"modified": "2024-07-30T09:32:02Z",
"published": "2024-07-30T09:32:02Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42143"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/137a06dc0ff8b2d2069c2345d015ef0fa71df1ed"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/1617249e24bd04c8047956afb43feec4876d1715"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/53e4efa470d5fc6a96662d2d3322cfc925818517"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/556edaa27c27db24a0f34c78cebef90e5bb6e167"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/6a3cacf6d3cf0278aa90392aef2fc3fe2717a047"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/74159d409da82269311a60256aad8ae8753da450"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/b90176a9553775e23966650e445b1866e62e4924"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/de8a5f7b71800a11fbaffc8ddacf08ead78afcc5"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…