CVE-2024-42265
protect the fetch of ->fd[fd] in do_dup2() from mispredictions
Description
In the Linux kernel, the following vulnerability has been resolved: protect the fetch of ->fd[fd] in do_dup2() from mispredictions both callers have verified that fd is not greater than ->max_fds; however, misprediction might end up with tofree = fdt->fd[fd]; being speculatively executed. That's wrong for the same reasons why it's wrong in close_fd()/file_close_fd_locked(); the same solution applies - array_index_nospec(fd, fdt->max_fds) could differ from fd only in case of speculative execution on mispredicted path.
INFO
Published Date :
Aug. 17, 2024, 9:15 a.m.
Last Modified :
Oct. 3, 2025, 6:58 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Update the affected Linux kernel packages.
- Update the affected packages for your distribution.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-42265.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-42265 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-42265
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-42265 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-42265 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Oct. 03, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE NVD-CWE-noinfo Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.10.4 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.45 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.165 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.224 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.282 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 4.19.320 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.104 Added Reference Type kernel.org: https://git.kernel.org/stable/c/08775b3d6ed117cf4518754ec7300ee42b6a5368 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/1171ceccabfd596ca370c5d2cbb47d110c3f2fe1 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/3f480493550b6a23d3a65d095d6569d4a7f56a0f Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/41a6c31df77bd8e050136b0a200b537da9e1084a Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/5db999fff545b924b24c9afd368ef5c17279b176 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/8aa37bde1a7b645816cda8b80df4753ecf172bf1 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/da72e783afd27d9f487836b2e6738146c0edd149 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/ed42e8ff509d2a61c6642d1825032072dab79f26 Types: Patch -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Aug. 19, 2024
Action Type Old Value New Value Added Reference kernel.org https://git.kernel.org/stable/c/ed42e8ff509d2a61c6642d1825032072dab79f26 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/41a6c31df77bd8e050136b0a200b537da9e1084a [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/08775b3d6ed117cf4518754ec7300ee42b6a5368 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/3f480493550b6a23d3a65d095d6569d4a7f56a0f [No types assigned] -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Aug. 17, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: protect the fetch of ->fd[fd] in do_dup2() from mispredictions both callers have verified that fd is not greater than ->max_fds; however, misprediction might end up with tofree = fdt->fd[fd]; being speculatively executed. That's wrong for the same reasons why it's wrong in close_fd()/file_close_fd_locked(); the same solution applies - array_index_nospec(fd, fdt->max_fds) could differ from fd only in case of speculative execution on mispredicted path. Added Reference kernel.org https://git.kernel.org/stable/c/5db999fff545b924b24c9afd368ef5c17279b176 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/da72e783afd27d9f487836b2e6738146c0edd149 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/1171ceccabfd596ca370c5d2cbb47d110c3f2fe1 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/8aa37bde1a7b645816cda8b80df4753ecf172bf1 [No types assigned]