CVE-2024-44947 (GCVE-0-2024-44947)
Vulnerability from cvelistv5
Published
2024-09-02 17:36
Modified
2025-11-03 22:13
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: fuse: Initialize beyond-EOF page contents before setting uptodate fuse_notify_store(), unlike fuse_do_readpage(), does not enable page zeroing (because it can be used to change partial page contents). So fuse_notify_store() must be more careful to fully initialize page contents (including parts of the page that are beyond end-of-file) before marking the page uptodate. The current code can leave beyond-EOF page contents uninitialized, which makes these uninitialized page contents visible to userspace via mmap(). This is an information leak, but only affects systems which do not enable init-on-alloc (via CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y or the corresponding kernel command line parameter).
Impacted products
Vendor Product Version
Linux Linux Version: a1d75f258230b75d46aecdf28b2e732413028863
Version: a1d75f258230b75d46aecdf28b2e732413028863
Version: a1d75f258230b75d46aecdf28b2e732413028863
Version: a1d75f258230b75d46aecdf28b2e732413028863
Version: a1d75f258230b75d46aecdf28b2e732413028863
Version: a1d75f258230b75d46aecdf28b2e732413028863
Version: a1d75f258230b75d46aecdf28b2e732413028863
Version: a1d75f258230b75d46aecdf28b2e732413028863
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-44947",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:27:03.431067Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-12T17:33:15.852Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T22:13:54.619Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/fuse/dev.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "49934861514d36d0995be8e81bb3312a499d8d9a",
              "status": "affected",
              "version": "a1d75f258230b75d46aecdf28b2e732413028863",
              "versionType": "git"
            },
            {
              "lessThan": "33168db352c7b56ae18aa55c2cae1a1c5905d30e",
              "status": "affected",
              "version": "a1d75f258230b75d46aecdf28b2e732413028863",
              "versionType": "git"
            },
            {
              "lessThan": "4690e2171f651e2b415e3941ce17f2f7b813aff6",
              "status": "affected",
              "version": "a1d75f258230b75d46aecdf28b2e732413028863",
              "versionType": "git"
            },
            {
              "lessThan": "8c78303eafbf85a728dd84d1750e89240c677dd9",
              "status": "affected",
              "version": "a1d75f258230b75d46aecdf28b2e732413028863",
              "versionType": "git"
            },
            {
              "lessThan": "831433527773e665bdb635ab5783d0b95d1246f4",
              "status": "affected",
              "version": "a1d75f258230b75d46aecdf28b2e732413028863",
              "versionType": "git"
            },
            {
              "lessThan": "ac42e0f0eb66af966015ee33fd355bc6f5d80cd6",
              "status": "affected",
              "version": "a1d75f258230b75d46aecdf28b2e732413028863",
              "versionType": "git"
            },
            {
              "lessThan": "18a067240817bee8a9360539af5d79a4bf5398a5",
              "status": "affected",
              "version": "a1d75f258230b75d46aecdf28b2e732413028863",
              "versionType": "git"
            },
            {
              "lessThan": "3c0da3d163eb32f1f91891efaade027fa9b245b9",
              "status": "affected",
              "version": "a1d75f258230b75d46aecdf28b2e732413028863",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/fuse/dev.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.36"
            },
            {
              "lessThan": "2.6.36",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.321",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.283",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.225",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.166",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.107",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.48",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.11",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.321",
                  "versionStartIncluding": "2.6.36",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.283",
                  "versionStartIncluding": "2.6.36",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.225",
                  "versionStartIncluding": "2.6.36",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.166",
                  "versionStartIncluding": "2.6.36",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.107",
                  "versionStartIncluding": "2.6.36",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.48",
                  "versionStartIncluding": "2.6.36",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10.7",
                  "versionStartIncluding": "2.6.36",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.11",
                  "versionStartIncluding": "2.6.36",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: Initialize beyond-EOF page contents before setting uptodate\n\nfuse_notify_store(), unlike fuse_do_readpage(), does not enable page\nzeroing (because it can be used to change partial page contents).\n\nSo fuse_notify_store() must be more careful to fully initialize page\ncontents (including parts of the page that are beyond end-of-file)\nbefore marking the page uptodate.\n\nThe current code can leave beyond-EOF page contents uninitialized, which\nmakes these uninitialized page contents visible to userspace via mmap().\n\nThis is an information leak, but only affects systems which do not\nenable init-on-alloc (via CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y or the\ncorresponding kernel command line parameter)."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T09:29:35.643Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/49934861514d36d0995be8e81bb3312a499d8d9a"
        },
        {
          "url": "https://git.kernel.org/stable/c/33168db352c7b56ae18aa55c2cae1a1c5905d30e"
        },
        {
          "url": "https://git.kernel.org/stable/c/4690e2171f651e2b415e3941ce17f2f7b813aff6"
        },
        {
          "url": "https://git.kernel.org/stable/c/8c78303eafbf85a728dd84d1750e89240c677dd9"
        },
        {
          "url": "https://git.kernel.org/stable/c/831433527773e665bdb635ab5783d0b95d1246f4"
        },
        {
          "url": "https://git.kernel.org/stable/c/ac42e0f0eb66af966015ee33fd355bc6f5d80cd6"
        },
        {
          "url": "https://git.kernel.org/stable/c/18a067240817bee8a9360539af5d79a4bf5398a5"
        },
        {
          "url": "https://git.kernel.org/stable/c/3c0da3d163eb32f1f91891efaade027fa9b245b9"
        },
        {
          "url": "https://project-zero.issues.chromium.org/issues/42451729"
        }
      ],
      "title": "fuse: Initialize beyond-EOF page contents before setting uptodate",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-44947",
    "datePublished": "2024-09-02T17:36:15.633Z",
    "dateReserved": "2024-08-21T05:34:56.665Z",
    "dateUpdated": "2025-11-03T22:13:54.619Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-44947\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-09-02T18:15:36.577\",\"lastModified\":\"2025-11-03T23:15:43.733\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfuse: Initialize beyond-EOF page contents before setting uptodate\\n\\nfuse_notify_store(), unlike fuse_do_readpage(), does not enable page\\nzeroing (because it can be used to change partial page contents).\\n\\nSo fuse_notify_store() must be more careful to fully initialize page\\ncontents (including parts of the page that are beyond end-of-file)\\nbefore marking the page uptodate.\\n\\nThe current code can leave beyond-EOF page contents uninitialized, which\\nmakes these uninitialized page contents visible to userspace via mmap().\\n\\nThis is an information leak, but only affects systems which do not\\nenable init-on-alloc (via CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y or the\\ncorresponding kernel command line parameter).\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fuse: inicializar el contenido de la p\u00e1gina m\u00e1s all\u00e1 del EOF antes de configurar uptodate fuse_notify_store(), a diferencia de fuse_do_readpage(), no habilita la puesta a cero de la p\u00e1gina (porque se puede usar para cambiar el contenido parcial de la p\u00e1gina). Por lo tanto, fuse_notify_store() debe ser m\u00e1s cuidadoso para inicializar por completo el contenido de la p\u00e1gina (incluidas las partes de la p\u00e1gina que est\u00e1n m\u00e1s all\u00e1 del fin del archivo) antes de marcar la p\u00e1gina como actualizada. El c\u00f3digo actual puede dejar el contenido de la p\u00e1gina m\u00e1s all\u00e1 del EOF sin inicializar, lo que hace que este contenido de p\u00e1gina no inicializado sea visible para el espacio de usuario a trav\u00e9s de mmap(). Esta es una fuga de informaci\u00f3n, pero solo afecta a los sistemas que no habilitan init-on-alloc (a trav\u00e9s de CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y o el par\u00e1metro de l\u00ednea de comandos del kernel correspondiente).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-665\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.36\",\"versionEndExcluding\":\"4.19.321\",\"matchCriteriaId\":\"440A7031-75FA-48A4-A35D-616BE72E784E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.283\",\"matchCriteriaId\":\"8E6B390A-0CE6-44FC-8CD5-BE8226D6D24C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.225\",\"matchCriteriaId\":\"C57B46A9-B105-4792-8481-1870DEFB436A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.166\",\"matchCriteriaId\":\"913ED6CD-8ACF-48AF-AA18-7880881DD402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.107\",\"matchCriteriaId\":\"53954FF8-CB48-4302-BC4C-9DA7A88F44A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.48\",\"matchCriteriaId\":\"9DE9201A-CE6B-4726-BABB-8265EA0F8AE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.7\",\"matchCriteriaId\":\"D2AFDFD1-D95A-4EB7-843B-5E7659518B67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3CE743-2126-47A3-8B7C-822B502CF119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEB27E7-30AA-45CC-8934-B89263EF3551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0005AEF-856E-47EB-BFE4-90C46899394D\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/18a067240817bee8a9360539af5d79a4bf5398a5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/33168db352c7b56ae18aa55c2cae1a1c5905d30e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3c0da3d163eb32f1f91891efaade027fa9b245b9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4690e2171f651e2b415e3941ce17f2f7b813aff6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/49934861514d36d0995be8e81bb3312a499d8d9a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/831433527773e665bdb635ab5783d0b95d1246f4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8c78303eafbf85a728dd84d1750e89240c677dd9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ac42e0f0eb66af966015ee33fd355bc6f5d80cd6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://project-zero.issues.chromium.org/issues/42451729\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T22:13:54.619Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-44947\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:27:03.431067Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:19.078Z\"}}], \"cna\": {\"title\": \"fuse: Initialize beyond-EOF page contents before setting uptodate\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"a1d75f258230b75d46aecdf28b2e732413028863\", \"lessThan\": \"49934861514d36d0995be8e81bb3312a499d8d9a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1d75f258230b75d46aecdf28b2e732413028863\", \"lessThan\": \"33168db352c7b56ae18aa55c2cae1a1c5905d30e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1d75f258230b75d46aecdf28b2e732413028863\", \"lessThan\": \"4690e2171f651e2b415e3941ce17f2f7b813aff6\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1d75f258230b75d46aecdf28b2e732413028863\", \"lessThan\": \"8c78303eafbf85a728dd84d1750e89240c677dd9\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1d75f258230b75d46aecdf28b2e732413028863\", \"lessThan\": \"831433527773e665bdb635ab5783d0b95d1246f4\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1d75f258230b75d46aecdf28b2e732413028863\", \"lessThan\": \"ac42e0f0eb66af966015ee33fd355bc6f5d80cd6\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1d75f258230b75d46aecdf28b2e732413028863\", \"lessThan\": \"18a067240817bee8a9360539af5d79a4bf5398a5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a1d75f258230b75d46aecdf28b2e732413028863\", \"lessThan\": \"3c0da3d163eb32f1f91891efaade027fa9b245b9\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/fuse/dev.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6.36\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"2.6.36\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.321\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.283\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.225\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.166\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.107\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.48\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/fuse/dev.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/49934861514d36d0995be8e81bb3312a499d8d9a\"}, {\"url\": \"https://git.kernel.org/stable/c/33168db352c7b56ae18aa55c2cae1a1c5905d30e\"}, {\"url\": \"https://git.kernel.org/stable/c/4690e2171f651e2b415e3941ce17f2f7b813aff6\"}, {\"url\": \"https://git.kernel.org/stable/c/8c78303eafbf85a728dd84d1750e89240c677dd9\"}, {\"url\": \"https://git.kernel.org/stable/c/831433527773e665bdb635ab5783d0b95d1246f4\"}, {\"url\": \"https://git.kernel.org/stable/c/ac42e0f0eb66af966015ee33fd355bc6f5d80cd6\"}, {\"url\": \"https://git.kernel.org/stable/c/18a067240817bee8a9360539af5d79a4bf5398a5\"}, {\"url\": \"https://git.kernel.org/stable/c/3c0da3d163eb32f1f91891efaade027fa9b245b9\"}, {\"url\": \"https://project-zero.issues.chromium.org/issues/42451729\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfuse: Initialize beyond-EOF page contents before setting uptodate\\n\\nfuse_notify_store(), unlike fuse_do_readpage(), does not enable page\\nzeroing (because it can be used to change partial page contents).\\n\\nSo fuse_notify_store() must be more careful to fully initialize page\\ncontents (including parts of the page that are beyond end-of-file)\\nbefore marking the page uptodate.\\n\\nThe current code can leave beyond-EOF page contents uninitialized, which\\nmakes these uninitialized page contents visible to userspace via mmap().\\n\\nThis is an information leak, but only affects systems which do not\\nenable init-on-alloc (via CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y or the\\ncorresponding kernel command line parameter).\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.321\", \"versionStartIncluding\": \"2.6.36\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.283\", \"versionStartIncluding\": \"2.6.36\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.225\", \"versionStartIncluding\": \"2.6.36\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.166\", \"versionStartIncluding\": \"2.6.36\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.107\", \"versionStartIncluding\": \"2.6.36\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.48\", \"versionStartIncluding\": \"2.6.36\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10.7\", \"versionStartIncluding\": \"2.6.36\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11\", \"versionStartIncluding\": \"2.6.36\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:29:35.643Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-44947\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T22:13:54.619Z\", \"dateReserved\": \"2024-08-21T05:34:56.665Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-02T17:36:15.633Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}