{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T04:07:47.341","vulnerabilities":[{"cve":{"id":"CVE-2024-42292","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-08-17T09:15:09.797","lastModified":"2025-11-03T22:17:57.177","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nkobject_uevent: Fix OOB access within zap_modalias_env()\n\nzap_modalias_env() wrongly calculates size of memory block to move, so\nwill cause OOB memory access issue if variable MODALIAS is not the last\none within its @env parameter, fixed by correcting size to memmove."},{"lang":"es","value":"En el kernel de Linux, se resolvió la siguiente vulnerabilidad: kobject_uevent: corrige el acceso OOB dentro de zap_modalias_env() zap_modalias_env() calcula incorrectamente el tamaño del bloque de memoria a mover, por lo que causará un problema de acceso a la memoria OOB si la variable MODALIAS no es la última dentro de su Parámetro @env, corregido corrigiendo el tamaño a memmove."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.15.1","versionEndExcluding":"4.19.320","matchCriteriaId":"EB9D2D0C-DF67-43DE-8861-B075D741BBB7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.282","matchCriteriaId":"A8961D98-9ACF-4188-BA88-44038B14BC28"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.224","matchCriteriaId":"5CCEDF13-293D-4E64-B501-4409D0365AFE"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.165","matchCriteriaId":"B4E2B568-3171-41DE-B519-F2B1A3600D94"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.103","matchCriteriaId":"E45EAC72-8329-4F99-8276-86AF9BB3496A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.6.44","matchCriteriaId":"CC912330-6B41-4C6B-99AF-F3857FBACB6A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.10.3","matchCriteriaId":"92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.15:-:*:*:*:*:*:*","matchCriteriaId":"3B4D39AF-668B-442B-8085-639A6D4FA5AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.15:rc6:*:*:*:*:*:*","matchCriteriaId":"639D2465-65E0-40E2-B7A8-BEA9E221DE54"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.15:rc7:*:*:*:*:*:*","matchCriteriaId":"A282AD0B-2D63-4F05-8F89-109A0975B423"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.15:rc8:*:*:*:*:*:*","matchCriteriaId":"30358221-183C-4699-994E-AF51F5D534FC"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.15:rc9:*:*:*:*:*:*","matchCriteriaId":"A5ED80A8-E656-4AE9-921B-C22402C94A4C"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/57fe01d3d04276875c7e3a6dc763517fc05b8762","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/648d5490460d38436640da0812bf7f6351c150d2","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/68d63ace80b76395e7935687ecdb86421adc2168","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/81a15d28f32af01493ae8c5457e0d55314a4167d","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/b59a5e86a3934f1b6a5bd1368902dbc79bdecc90","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/c5ee8adc8d98a49703320d13878ba2b923b142f5","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/d4663536754defff75ff1eca0aaebc41da165a8d","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/dd6e9894b451e7c85cceb8e9dc5432679a70e7dc","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}