CVE-2024-42094

Source
https://cve.org/CVERecord?id=CVE-2024-42094
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42094.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42094
Downstream
Related
Published
2024-07-29T17:39:30.191Z
Modified
2026-03-20T12:38:41.446752Z
Summary
net/iucv: Avoid explicit cpumask var allocation on stack
Details

In the Linux kernel, the following vulnerability has been resolved:

net/iucv: Avoid explicit cpumask var allocation on stack

For CONFIGCPUMASKOFFSTACK=y kernel, explicit allocation of cpumask variable on stack is not recommended since it can cause potential stack overflow.

Instead, kernel code should always use *cpumaskvar API(s) to allocate cpumask var in config-neutral way, leaving allocation strategy to CONFIGCPUMASK_OFFSTACK.

Use *cpumask_var API(s) to address it.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42094.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2356f4cb191100a5e92d537f13e5efdbc697e9cb
Fixed
2b085521be5292016097b5e7ca81b26be3f7098d
Fixed
842afb47d84536fc976fece8fb6c54bea711ad1a
Fixed
9dadab0db7d904413ea1cdaa13f127da05c31e71
Fixed
0af718a690acc089aa1bbb95a93df833d864ef53
Fixed
d85ca8179a54ff8cf1e1f8c3c9e3799831319bae
Fixed
724e7965af054079242b8d6f7e50ee226730a756
Fixed
2d090c7f7be3b26fcb80ac04d08a4a8062b1d959
Fixed
be4e1304419c99a164b4c0e101c7c2a756b635b9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42094.json"