cve/2024/CVE-2024-58010.md
2025-09-29 21:09:30 +02:00

21 lines
1.1 KiB
Markdown

### [CVE-2024-58010](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58010)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=c995ee28d29d6f256c3a8a6c4e66469554374f25%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
In the Linux kernel, the following vulnerability has been resolved:binfmt_flat: Fix integer overflow bug on 32 bit systemsMost of these sizes and counts are capped at 256MB so the math doesn'tresult in an integer overflow. The "relocs" count needs to be checkedas well. Otherwise on 32bit systems the calculation of "full_data"could be wrong. full_data = data_len + relocs * sizeof(unsigned long);
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/w4zu/Debian_security