
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-38661 affects the Linux kernel's s390/ap subsystem, specifically in the AP internal function modify_bitmap(). The vulnerability was discovered in June 2024 and involves an integer overflow vulnerability in the handling of relative mask values in the /sys/bus/ap/a[pq]mask interface (NVD).
The vulnerability occurs when the /sys/bus/ap/a[pq]mask interface is updated with a relative mask value (like +0x10-0x12,+60,-90) where one of the numeric values exceeds INTMAX. The root cause is the use of simple int type for internal variables in the modifybitmap() function, which can lead to an integer overflow. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, this vulnerability can cause a system crash through a kernel panic. The issue specifically affects the s390 architecture systems when attempting to modify AP bus masks with values exceeding INT_MAX, leading to a fatal exception and system panic (NVD).
The fix involves changing the variable types from int to unsigned long for the internal variables (a, i, z) in the modify_bitmap() function. The correct checks were already present in the function, but the integer type limitation caused the overflow possibility. Multiple kernel versions have been patched to address this vulnerability (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."