First published: Wed Jun 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group The perf tool allows users to create event groups through following cmd [1], but the driver does not check whether the array index is out of bounds when writing data to the event_group array. If the number of events in an event_group is greater than HISI_PCIE_MAX_COUNTERS, the memory write overflow of event_group array occurs. Add array index check to fix the possible array out of bounds violation, and return directly when write new events are written to array bounds. There are 9 different events in an event_group. [1] perf stat -e '{pmu/event1/, ... ,pmu/event9/}'
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.17<6.1.93 | |
Linux Kernel | >=6.2<6.6.33 | |
Linux Kernel | >=6.7<6.8.12 | |
Linux Kernel | >=6.9<6.9.3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38569 is classified as a moderate severity vulnerability due to potential out-of-bounds access that may impact system stability.
To mitigate CVE-2024-38569, update your Linux kernel to versions 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.11-1, or 6.12.12-1.
CVE-2024-38569 affects specific versions of the Linux kernel ranging from 5.17 to 6.9.3.
CVE-2024-38569 involves out-of-bounds access, which can lead to potential denial of service or data corruption.
CVE-2024-38569 impacts the drivers/perf component related to the hisi_pcie driver.