
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's EROFS (Enhanced Read-Only File System) has been identified and tracked as CVE-2024-46688. The issue occurs when zerofsgbuf_growsize() partially fails on a global buffer due to memory allocation failure or fault injection. The vulnerability affects Linux kernel versions from 6.10 up to (excluding) 6.10.8, and various release candidates of version 6.11 (rc1 through rc4) (NVD).
The vulnerability is related to an out-of-bounds access issue in the EROFS filesystem component. When zerofsgbuf_growsize() partially fails, new pages need to be freed by comparing them to existing pages to avoid memory leaks. However, the old gbuf->pages[] array may not be large enough, which can lead to null-pointer dereference or out-of-bounds access. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local access requirements and potential high impact on availability (NVD).
The vulnerability can result in out-of-bounds access and null-pointer dereference in the Linux kernel's EROFS implementation. This could potentially lead to system crashes or denial of service conditions when the vulnerable code path is triggered (Kernel Patch).
The vulnerability has been fixed by adding a check against gbuf->nrpages before accessing the array elements. The fix has been implemented in the Linux kernel through patches that modify the fs/erofs/zutil.c file (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."