In the Linux kernel, the following vulnerability has been resolved:
kobjectuevent: Fix OOB access within zapmodalias_env()
zapmodaliasenv() wrongly calculates size of memory block to move, so will cause OOB memory access issue if variable MODALIAS is not the last one within its @env parameter, fixed by correcting size to memmove.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42292.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "lib/kobject_uevent.c"
},
"id": "CVE-2024-42292-3113eb8d",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57fe01d3d04276875c7e3a6dc763517fc05b8762",
"digest": {
"line_hashes": [
"13752752675615713420027048935917015376",
"241839232553137287044630701708621372763",
"93362584226230761508465568362972588494",
"209424808765514509700645533461970693473",
"304057489897362565086901619911544752111",
"22520006462895804657496700976807002484"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"digest": {
"function_hash": "79761443352732857982970400490910790907",
"length": 596.0
},
"deprecated": false,
"id": "CVE-2024-42292-739ee092",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@57fe01d3d04276875c7e3a6dc763517fc05b8762",
"target": {
"file": "lib/kobject_uevent.c",
"function": "zap_modalias_env"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42292.json"