Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-12455

Опубликовано: 12 дек. 2024
Источник: redhat
CVSS3: 6.3

Описание

A flaw was found in Fedora 41's glibc implementation of getrandom() for ppc64le. This issue occurs due to an implementation error for a vDSO indirect function call and the way the return of success and possible error codes are signaled on this platform. As a result, getrandom() fails to produce randomness or may end up causing an out-of-bounds write. As the attacker has no full control over where the out-of-bounds write may happen, the most likely result is smaller data corruption or a Denial-of-Service of the affected application. This issue is specific for glibc-2.40-12.fc41 as shipped with Fedora 41 only.

Отчет

This vulnerability doesn't affect any glibc package version, as the vulnerable code was not included in any supported product.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10glibcNot affected
Red Hat Enterprise Linux 6compat-glibcNot affected
Red Hat Enterprise Linux 6glibcNot affected
Red Hat Enterprise Linux 7compat-glibcNot affected
Red Hat Enterprise Linux 7glibcNot affected
Red Hat Enterprise Linux 8glibcNot affected
Red Hat Enterprise Linux 9glibcNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-394
https://bugzilla.redhat.com/show_bug.cgi?id=2332111glibc: glibc in Fedora 41 ships a broken getrandom/arc4random for ppc64le platform

6.3 Medium

CVSS3

Связанные уязвимости

ubuntu
около 1 года назад

[powerpc: getrandom() returns EINVAL as retcode instead of errno]

debian

[powerpc: getrandom() returns EINVAL as retcode instead of errno]

CVSS3: 6.3
fstec
около 1 года назад

Уязвимость функции getrandom() системной библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании

6.3 Medium

CVSS3