CVE-2024-35905 — Improper Validation of Array Index in Linux
CWE-129 — Improper Validation of Array IndexCWE-190 — Integer Overflow or Wraparound30 documents7 sources
Severity
7.8HIGHNVD
OSV6.8OSV5.5
EPSS
0.0%
top 91.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 19
Latest updateSep 18
Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: Protect against int overflow for stack access size
This patch re-introduces protection against the size of access to stack
memory being negative; the access size can appear negative as a result
of overflowing its signed int representation. This should not actually
happen, as there are other protections along the way, but we should
protect against it anyway. One code path was missing such protections
(fixed in the previous…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages5 packages
▶CVEListV5linux/linuxafea95d319ccb4ad2060dece9ac5e2e364dec543 — 9970e059af471478455f9534e8c3db82f8c5496d+7
Also affects: Debian Linux 10.0