CVE-2024-42265

Source
https://cve.org/CVERecord?id=CVE-2024-42265
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42265.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42265
Downstream
Related
Published
2024-08-17T08:54:21.636Z
Modified
2026-03-11T07:55:07.767404Z
Summary
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
Details

In the Linux kernel, the following vulnerability has been resolved:

protect the fetch of ->fd[fd] in do_dup2() from mispredictions

both callers have verified that fd is not greater than ->maxfds; however, misprediction might end up with tofree = fdt->fd[fd]; being speculatively executed. That's wrong for the same reasons why it's wrong in closefd()/fileclosefdlocked(); the same solution applies - arrayindexnospec(fd, fdt->maxfds) could differ from fd only in case of speculative execution on mispredicted path.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42265.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8280d16172243702ed43432f826ca6130edb4086
Fixed
ed42e8ff509d2a61c6642d1825032072dab79f26
Fixed
41a6c31df77bd8e050136b0a200b537da9e1084a
Fixed
08775b3d6ed117cf4518754ec7300ee42b6a5368
Fixed
3f480493550b6a23d3a65d095d6569d4a7f56a0f
Fixed
5db999fff545b924b24c9afd368ef5c17279b176
Fixed
da72e783afd27d9f487836b2e6738146c0edd149
Fixed
1171ceccabfd596ca370c5d2cbb47d110c3f2fe1
Fixed
8aa37bde1a7b645816cda8b80df4753ecf172bf1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42265.json"