{"id":"CVE-2024-42265","summary":"protect the fetch of -\u003efd[fd] in do_dup2() from mispredictions","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nprotect the fetch of -\u003efd[fd] in do_dup2() from mispredictions\n\nboth callers have verified that fd is not greater than -\u003emax_fds;\nhowever, misprediction might end up with\n        tofree = fdt-\u003efd[fd];\nbeing speculatively executed.  That's wrong for the same reasons\nwhy it's wrong in close_fd()/file_close_fd_locked(); the same\nsolution applies - array_index_nospec(fd, fdt-\u003emax_fds) could differ\nfrom fd only in case of speculative execution on mispredicted path.","modified":"2026-03-20T12:38:45.332393Z","published":"2024-08-17T08:54:21.636Z","related":["MGASA-2024-0309","MGASA-2024-0310","SUSE-SU-2024:3551-1","SUSE-SU-2024:3559-1","SUSE-SU-2024:3561-1","SUSE-SU-2024:3564-1","SUSE-SU-2024:3566-1","SUSE-SU-2024:3569-1","SUSE-SU-2024:3587-1","SUSE-SU-2024:3591-1","SUSE-SU-2024:3592-1","SUSE-SU-2025:02849-1","SUSE-SU-2025:02851-1","SUSE-SU-2025:03283-1","SUSE-SU-2025:03310-1","SUSE-SU-2025:03344-1","SUSE-SU-2025:03384-1","SUSE-SU-2025:20073-1","SUSE-SU-2025:20077-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42265.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/08775b3d6ed117cf4518754ec7300ee42b6a5368"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1171ceccabfd596ca370c5d2cbb47d110c3f2fe1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3f480493550b6a23d3a65d095d6569d4a7f56a0f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/41a6c31df77bd8e050136b0a200b537da9e1084a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5db999fff545b924b24c9afd368ef5c17279b176"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8aa37bde1a7b645816cda8b80df4753ecf172bf1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/da72e783afd27d9f487836b2e6738146c0edd149"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ed42e8ff509d2a61c6642d1825032072dab79f26"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42265.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42265"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8280d16172243702ed43432f826ca6130edb4086"},{"fixed":"ed42e8ff509d2a61c6642d1825032072dab79f26"},{"fixed":"41a6c31df77bd8e050136b0a200b537da9e1084a"},{"fixed":"08775b3d6ed117cf4518754ec7300ee42b6a5368"},{"fixed":"3f480493550b6a23d3a65d095d6569d4a7f56a0f"},{"fixed":"5db999fff545b924b24c9afd368ef5c17279b176"},{"fixed":"da72e783afd27d9f487836b2e6738146c0edd149"},{"fixed":"1171ceccabfd596ca370c5d2cbb47d110c3f2fe1"},{"fixed":"8aa37bde1a7b645816cda8b80df4753ecf172bf1"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42265.json"}}],"schema_version":"1.7.5"}