Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: gve: Account for stopped queues when reading NIC stats We now account for the fact that the NIC might send us stats for a subset of queues. Without this change, gve_get_ethtool_stats might make an invalid access on the priv->stats_report->stats array.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.3, <= 6.9.9 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/32675d828c8a392e20d5b42375ed112c407e4b62Patch
- https://git.kernel.org/stable/c/af9bcf910b1f86244f39e15e701b2dc564b469a6Patch
- https://git.kernel.org/stable/c/32675d828c8a392e20d5b42375ed112c407e4b62Patch
- https://git.kernel.org/stable/c/af9bcf910b1f86244f39e15e701b2dc564b469a6Patch
FAQ
What is CVE-2024-42162?
CVE-2024-42162 is a vulnerability with a CVSS score of 7.0 (HIGH). In the Linux kernel, the following vulnerability has been resolved: gve: Account for stopped queues when reading NIC stats We now account for the fact that the NIC might send us stats for a subset o...
How severe is CVE-2024-42162?
CVE-2024-42162 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-42162?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.