CVE-2024-46744

Improper Link Resolution Before File Access ('Link Following') (CWE-59)

Published: Sep 18, 2024 / Updated: 2mo ago

010
CVSS 7.8EPSS 0.04%High
CVE info copied to clipboard

Summary

A vulnerability in the Linux kernel's SquashFS implementation has been identified. The issue stems from improper sanity checking of symbolic link sizes, which can lead to the processing of corrupted symbolic link data. This vulnerability allows for the creation of an uninitialized page due to integer overflow when handling a corrupted symlink size.

Impact

This vulnerability could potentially lead to arbitrary code execution, information disclosure, or system crashes. An attacker with local access and low privileges could exploit this flaw to elevate privileges, access sensitive information, or cause a denial of service. The high impact on confidentiality, integrity, and availability indicates that successful exploitation could compromise the entire system.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

Patches are available for this vulnerability. Multiple patch commits have been made to the Linux kernel git repository to address this issue. These patches add a sanity check to ensure that the symbolic link size is not larger than expected.

Mitigation

To mitigate this vulnerability, it is strongly recommended to update the Linux kernel to a patched version. The following versions should be updated: 1. Versions before 4.19.322 2. Versions 4.20 to 5.4.284 3. Versions 5.5 to 5.10.226 4. Versions 5.11 to 5.15.167 5. Versions 5.16 to 6.1.110 6. Versions 6.2 to 6.6.51 7. Versions 6.7 to 6.10.10 8. Specific release candidates: 6.11-rc1, 6.11-rc2, and 6.11-rc3 If immediate patching is not possible, consider restricting local access to the system and monitoring for unusual activities or crashes related to SquashFS operations.

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-46744

Sep 18, 2024 at 8:15 AM
First Article

Feedly found the first article mentioning CVE-2024-46744. See article

Sep 18, 2024 at 8:48 AM / National Vulnerability Database
EPSS

EPSS Score was set to: 0.04% (Percentile: 13.8%)

Sep 19, 2024 at 10:34 AM
CVSS

A CVSS base score of 7.8 has been assigned.

Sep 30, 2024 at 1:40 PM / nvd
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (208045)

Oct 3, 2024 at 3:15 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (208038)

Oct 3, 2024 at 3:15 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (208053)

Oct 3, 2024 at 3:16 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (208099)

Oct 4, 2024 at 3:15 AM
Threat Intelligence Report

The provided sentences do not contain specific details about CVE-2024-46744, such as its criticality, CVSS score, exploitation status, proof-of-concept exploits, mitigations, detections, patches, or downstream impacts. Therefore, a summary cannot be accurately constructed based on the information given. Further details would be necessary to provide a comprehensive overview of the vulnerability. See article

Oct 4, 2024 at 5:37 AM
Static CVE Timeline Graph

Affected Systems

Linux/linux_kernel
+null more

Patches

git.kernel.org
+null more

Links to Mitre Att&cks

T1547.009: Shortcut Modification
+null more

Attack Patterns

CAPEC-132: Symlink Attack
+null more

References

Oracle8: ELSA-2024-12813: kernel Important Security Advisory Updates
The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:
Security: Mehrere Probleme in Linux (SUSE)
SUSE: 2024:3591-1 important: the Linux Kernel Security Advisory Updates
* bsc#1054914 * bsc#1065729 * bsc#1207341 * bsc#1225316 * bsc#1226846
See 7 more references

News

ALAS-2024-2696 (medium): kernel
CVE-2024-44987, CVE-2024-46738, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46750, CVE-2024-46756, CVE-2024-46757, CVE-2024-46758, CVE-2024-46759, CVE-2024-46780, CVE-2024-46781, CVE-2024-46800, CVE-2024-46829, CVE-2024-46840
ubuntu_linux USN-7088-5: Ubuntu 18.04 LTS / Ubuntu 20.04 LTS : Linux kernel vulnerabilities (USN-7088-5)
Development Last Updated: 11/15/2024 CVEs: CVE-2024-41012 , CVE-2024-44954 , CVE-2024-46744 , CVE-2024-43914 , CVE-2024-46817 , CVE-2024-43908 , CVE-2024-26891 , CVE-2024-46829 , CVE-2024-47667 , CVE-2024-43854 , CVE-2024-27051 , CVE-2024-26800 , CVE-2024-42311 , CVE-2024-43858 , CVE-2024-45025 , CVE-2024-46738 , CVE-2024-41063 , CVE-2024-46815 , CVE-2024-42259 , CVE-2024-41098 , CVE-2024-42309 , CVE-2024-46739 , CVE-2024-46745 , CVE-2024-45026 , CVE-2024-42288 , CVE-2024-42305 , CVE-2024-46780 , CVE-2024-44947 , CVE-2024-38602 , CVE-2024-46719 , CVE-2024-43835 , CVE-2024-41091 , CVE-2024-42313 , CVE-2024-42271 , CVE-2024-42285 , CVE-2024-41042 , CVE-2024-44995 , CVE-2024-46685 , CVE-2024-41073 , CVE-2024-42280 , CVE-2024-41081 , CVE-2024-45003 , CVE-2024-41059 , CVE-2024-43884 , CVE-2024-44944 , CVE-2024-46782 , CVE-2024-41068 , CVE-2024-46714 , CVE-2022-36402 , CVE-2023-52614 , CVE-2024-43894 , CVE-2024-46771 , CVE-2024-42304 , CVE-2024-42310 , CVE-2024-35848 , CVE-2024-46679 , CVE-2024-43861 , CVE-2024-42246 , CVE-2024-46800 , CVE-2024-41020 , CVE-2024-43846 , CVE-2024-44952 , CVE-2024-42276 , CVE-2024-42301 , CVE-2024-45021 , CVE-2024-43890 , CVE-2024-41015 , CVE-2024-43883 , CVE-2024-44965 , CVE-2024-45028 , CVE-2024-44960 , CVE-2024-47663 , CVE-2024-41071 , CVE-2024-26885 , CVE-2024-47669 , CVE-2024-41011 , CVE-2024-43893 , CVE-2024-46783 , CVE-2024-43871 , CVE-2024-26669 , CVE-2024-41017 , CVE-2024-36484 , CVE-2024-42290 , CVE-2024-43860 , CVE-2024-46822 , CVE-2024-41065 , CVE-2024-46737 , CVE-2024-46758 , CVE-2024-41072 , CVE-2024-46721 , CVE-2024-42131 , CVE-2024-46781 , CVE-2024-43867 , CVE-2024-44935 , CVE-2024-46818 , CVE-2024-41090 , CVE-2024-46761 , CVE-2024-46723 , CVE-2024-26607 , CVE-2024-44948 , CVE-2024-46755 , CVE-2024-46840 , CVE-2024-41070 , CVE-2024-38611 , CVE-2024-44998 , CVE-2024-44987 , CVE-2024-42283 , CVE-2024-46798 , CVE-2024-42297 , CVE-2024-41022 , CVE-2024-42229 , CVE-2024-46689 , CVE-2024-46844 , CVE-2024-42286 , CVE-2024-44946 , CVE-2024-45008 , CVE-2024-46757 , CVE-2024-42295 , CVE-2024-43829 , CVE-2024-47668 , CVE-2024-42287 , CVE-2023-52918 , CVE-2024-42292 , CVE-2024-43879 , CVE-2024-43880 , CVE-2024-46759 , CVE-2024-26641 , CVE-2024-42265 , CVE-2023-52531 , CVE-2024-41064 , CVE-2021-47212 , CVE-2024-42244 , CVE-2024-46677 , CVE-2024-44969 , CVE-2024-46673 , CVE-2024-47659 , CVE-2024-43830 , CVE-2024-26668 , CVE-2024-26640 , CVE-2024-42284 , CVE-2024-40929 , CVE-2024-46740 , CVE-2024-46828 , CVE-2024-43882 , CVE-2024-43856 , CVE-2024-46743 , CVE-2024-43853 , CVE-2024-46722 , CVE-2024-46756 , CVE-2024-46675 , CVE-2024-44988 , CVE-2024-45006 , CVE-2024-46676 , CVE-2024-43839 , CVE-2024-46777 , CVE-2024-42289 , CVE-2024-43841 , CVE-2024-46747 , CVE-2024-46750 , CVE-2024-42306 , CVE-2024-44999 , CVE-2024-42281
Ubuntu update for linux-raspi
Amazon Linux 2023 : kernel (ALAS2023-2024-744)
In the Linux kernel, the following vulnerability has been resolved: In the Linux kernel, the following vulnerability has been resolved:
Oracle8: ELSA-2024-12813: kernel Important Security Advisory Updates
The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:
See 44 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI