CVE-2024-42131

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-42131
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42131.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42131
Downstream
Related
Published
2024-07-30T07:46:26.872Z
Modified
2025-11-28T02:35:48.594823Z
Summary
mm: avoid overflows in dirty throttling logic
Details

In the Linux kernel, the following vulnerability has been resolved:

mm: avoid overflows in dirty throttling logic

The dirty throttling logic is interspersed with assumptions that dirty limits in PAGESIZE units fit into 32-bit (so that various multiplications fit into 64-bits). If limits end up being larger, we will hit overflows, possible divisions by 0 etc. Fix these problems by never allowing so large dirty limits as they have dubious practical value anyway. For dirtybytes / dirtybackgroundbytes interfaces we can just refuse to set so large limits. For dirtyratio / dirtybackgroundratio it isn't so simple as the dirty limit is computed from the amount of available memory which can change due to memory hotplug etc. So when converting dirty limits from ratios to numbers of pages, we just don't allow the result to exceed UINTMAX.

This is root-only triggerable problem which occurs when the operator sets dirty limits to >16 TB.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42131.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
2b2d2b8766db028bd827af34075f221ae9e9efff
Fixed
4d3817b64eda07491bdd86a234629fe0764fb42a
Fixed
7a49389771ae7666f4dc3426e2a4594bf23ae290
Fixed
a25e8536184516b55ef89ab91dd2eea429de28d2
Fixed
c83ed422c24f0d4b264f89291d4fabe285f80dbc
Fixed
bd16a7ee339aef3ee4c90cb23902afb6af379ea0
Fixed
8e0b5e7f2895eccef5c2a0018b589266f90c4805
Fixed
385d838df280eba6c8680f9777bfa0d0bfe7e8b2

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.320
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.282
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.222
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.163
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.98
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.39
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.9.9