CVE-2024-42312

Updated:

Description:

In the Linux kernel, the following vulnerability has been resolved: sysctl: always initialize i_uid/i_gid Always initialize i_uid/i_gid inside the sysfs core so set_ownership() can safely skip setting them. Commit 5ec27ec735ba ("fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys inodes.") added defaults for i_uid/i_gid when set_ownership() was not implemented. It also missed adjusting net_ctl_set_ownership() to use the same default values in case the computation of a better value failed.

CVSS3: 5.5


Vendor State

OS Vendor version Errata
Debian 11 5.10.226-1 DLA-3912-1
Ubuntu 22.04 5.15.0-125.135 USN-7100-1
Ubuntu 22.04 AWS 5.15.0-1072.78 USN-7100-2
Ubuntu 22.04 Azure 5.15.0-1075.84 USN-7123-1
Debian 11 cloud 5.10.226-1 DLA-3912-1
Ubuntu 20.04 HWE AWS 5.15.0-1072.78~20.04.1 USN-7100-1
Oracle Linux 9 UEK 7 5.15.0-302.167.6.el9uek ELSA-2024-12815
Oracle Linux 8 UEK 7 5.15.0-302.167.6.el8uek ELSA-2024-12815
Ubuntu 24.04 6.8.0-50.51 USN-7154-1

KernelCare State

OS Original kernel version State
Debian 11
Planned
Ubuntu 22.04
Planned
Ubuntu 22.04 AWS
Planned
Ubuntu 22.04 Azure
Planned
Debian 11 cloud
Planned
Ubuntu 20.04 HWE AWS
Planned
Oracle Linux 9 UEK 7
Planned
Oracle Linux 8 UEK 7
Planned
Debian 12
Planned
Ubuntu 24.04
Planned