Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-42102", "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "state": "PUBLISHED", "assignerShortName": "Linux", "dateReserved": "2024-07-29T15:50:41.174Z", "datePublished": "2024-07-30T07:45:58.423Z", "dateUpdated": "2025-05-04T12:57:37.713Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux", "dateUpdated": "2025-05-04T12:57:37.713Z"}, "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again\"\n\nPatch series \"mm: Avoid possible overflows in dirty throttling\".\n\nDirty throttling logic assumes dirty limits in page units fit into\n32-bits. This patch series makes sure this is true (see patch 2/2 for\nmore details).\n\n\nThis patch (of 2):\n\nThis reverts commit 9319b647902cbd5cc884ac08a8a6d54ce111fc78.\n\nThe commit is broken in several ways. Firstly, the removed (u64) cast\nfrom the multiplication will introduce a multiplication overflow on 32-bit\narchs if wb_thresh * bg_thresh >= 1<<32 (which is actually common - the\ndefault settings with 4GB of RAM will trigger this). Secondly, the\ndiv64_u64() is unnecessarily expensive on 32-bit archs. We have\ndiv64_ul() in case we want to be safe & cheap. Thirdly, if dirty\nthresholds are larger than 1<<32 pages, then dirty balancing is going to\nblow up in many other spectacular ways anyway so trying to fix one\npossible overflow is just moot."}], "affected": [{"product": "Linux", "vendor": "Linux", "defaultStatus": "unaffected", "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "programFiles": ["mm/page-writeback.c"], "versions": [{"version": "c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e", "lessThan": "253f9ea7e8e53a5176bd80ceb174907b10724c1a", "status": "affected", "versionType": "git"}, {"version": "1f12e4b3284d6c863f272eb2de0d4248ed211cf4", "lessThan": "23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807", "status": "affected", "versionType": "git"}, {"version": "81e7d2530d458548b90a5c5e76b77ad5e5d1c0df", "lessThan": "145faa3d03688cbb7bbaaecbd84c01539852942c", "status": "affected", "versionType": "git"}, {"version": "5099871b370335809c0fd1abad74d9c7c205d43f", "lessThan": "2820005edae13b140f2d54267d1bd6bb23915f59", "status": "affected", "versionType": "git"}, {"version": "16b1025eaa8fc223ab4273ece20d1c3a4211a95d", "lessThan": "cbbe17a324437c0ff99881a3ee453da45b228a00", "status": "affected", "versionType": "git"}, {"version": "ec18ec230301583395576915d274b407743d8f6c", "lessThan": "f6620df12cb6bdcad671d269debbb23573502f9d", "status": "affected", "versionType": "git"}, {"version": "9319b647902cbd5cc884ac08a8a6d54ce111fc78", "lessThan": "000099d71648504fb9c7a4616f92c2b70c3e44ec", "status": "affected", "versionType": "git"}, {"version": "9319b647902cbd5cc884ac08a8a6d54ce111fc78", "lessThan": "30139c702048f1097342a31302cbd3d478f50c63", "status": "affected", "versionType": "git"}, {"version": "65977bed167a92e87085e757fffa5798f7314c9f", "status": "affected", "versionType": "git"}]}, {"product": "Linux", "vendor": "Linux", "defaultStatus": "affected", "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "programFiles": ["mm/page-writeback.c"], "versions": [{"version": "6.8", "status": "affected"}, {"version": "0", "lessThan": "6.8", "status": "unaffected", "versionType": "semver"}, {"version": "4.19.318", "lessThanOrEqual": "4.19.*", "status": "unaffected", "versionType": "semver"}, {"version": "5.4.280", "lessThanOrEqual": "5.4.*", "status": "unaffected", "versionType": "semver"}, {"version": "5.10.222", "lessThanOrEqual": "5.10.*", "status": "unaffected", "versionType": "semver"}, {"version": "5.15.163", "lessThanOrEqual": "5.15.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.1.98", "lessThanOrEqual": "6.1.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.6.39", "lessThanOrEqual": "6.6.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.9.9", "lessThanOrEqual": "6.9.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.10", "lessThanOrEqual": "*", "status": "unaffected", "versionType": "original_commit_for_fix"}]}], "cpeApplicability": [{"nodes": [{"operator": "OR", "negate": false, "cpeMatch": [{"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.19.307", "versionEndExcluding": "4.19.318"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.4.269", "versionEndExcluding": "5.4.280"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.10.210", "versionEndExcluding": "5.10.222"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15.149", "versionEndExcluding": "5.15.163"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.1.79", "versionEndExcluding": "6.1.98"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.6.18", "versionEndExcluding": "6.6.39"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.8", "versionEndExcluding": "6.9.9"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.8", "versionEndExcluding": "6.10"}, {"vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.7.6"}]}]}], "references": [{"url": "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a"}, {"url": "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807"}, {"url": "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c"}, {"url": "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59"}, {"url": "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00"}, {"url": "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d"}, {"url": "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec"}, {"url": "https://git.kernel.org/stable/c/30139c702048f1097342a31302cbd3d478f50c63"}], "title": "Revert \"mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again\"", "x_generator": {"engine": "bippy-1.2.0"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T04:54:32.558Z"}, "title": "CVE Program Container", "references": [{"url": "https://git.kernel.org/stable/c/253f9ea7e8e53a5176bd80ceb174907b10724c1a", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/23a28f5f3f6ca1e4184bd0e9631cd0944cf1c807", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/145faa3d03688cbb7bbaaecbd84c01539852942c", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/2820005edae13b140f2d54267d1bd6bb23915f59", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/cbbe17a324437c0ff99881a3ee453da45b228a00", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/f6620df12cb6bdcad671d269debbb23573502f9d", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/000099d71648504fb9c7a4616f92c2b70c3e44ec", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/30139c702048f1097342a31302cbd3d478f50c63", "tags": ["x_transferred"]}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2024-42102", "role": "CISA Coordinator", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "version": "2.0.3", "timestamp": "2024-09-10T16:17:59.274407Z"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-11T17:32:59.444Z"}}]}}