CVE-2024-23851 Affecting kernel package, versions <0:4.14.336-257.562.amzn2
Threat Intelligence
EPSS
0.04% (6th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN2-KERNEL-7447392
- published 13 Jul 2024
- disclosed 23 Jan 2024
Introduced: 23 Jan 2024
CVE-2024-23851 Open this link in a new tabHow to fix?
Upgrade Amazon-Linux:2
kernel
to version 0:4.14.336-257.562.amzn2 or higher.
This issue was patched in ALAS2-2024-2475
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel
package and not the kernel
package as distributed by Amazon-Linux
.
See How to fix?
for Amazon-Linux:2
relevant fixed versions and status.
copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel->data_size check. This is related to ctl_ioctl.
References
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
- https://www.spinics.net/lists/dm-devel/msg56574.html
- https://www.spinics.net/lists/dm-devel/msg56694.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
CVSS Scores
version 3.1