CVE-2024-39499

Updated: 2024-09-23 22:29:15.65612

Description:

In the Linux kernel, the following vulnerability has been resolved: vmci: prevent speculation leaks by sanitizing event in event_deliver() Coverity spotted that event_msg is controlled by user-space, event_msg->event_data.event is passed to event_deliver() and used as an index without sanitization. This change ensures that the event index is sanitized to mitigate any possibility of speculative information leaks. This bug was discovered and resolved using Coverity Static Analysis Security Testing (SAST) by Synopsys, Inc. Only compile tested, no access to HW.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0
CVSS Version 3.x MEDIUM 4.1

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 4.1 MEDIUM Ignored 2024-09-25 12:26:27
CentOS 6 ELS kernel 2.6.32 4.1 MEDIUM Ignored 2024-09-25 12:26:27
CentOS 7 ELS kernel 3.10.0 4.1 MEDIUM Ignored 2024-09-25 12:26:27
CentOS 8.4 ELS kernel 4.18.0 4.1 MEDIUM Released CLSA-2024:1727690947 2024-09-30 10:47:36
CentOS 8.5 ELS kernel 4.18.0 4.1 MEDIUM Released CLSA-2024:1727690025 2024-09-30 10:47:37
CentOS Stream 8 ELS kernel 4.18.0 4.1 MEDIUM Released CLSA-2024:1727815919 2024-10-01 17:28:03
CloudLinux 6 ELS kernel 2.6.32 4.1 MEDIUM Ignored 2024-09-25 12:26:27
CloudLinux 7 ELS kernel 3.10.0 4.1 MEDIUM Ignored 2024-09-25 12:26:27
Oracle Linux 6 ELS kernel 2.6.32 4.1 MEDIUM Ignored 2024-09-25 12:26:27
Ubuntu 16.04 ELS linux-hwe 4.15.0 4.1 MEDIUM Released CLSA-2024:1727817159 2024-10-01 17:25:42
Total: 12