aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-03-27 14:51:28 +0100
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-03-27 14:51:43 +0100
commite11fe7c476b0e92bd301ed46662fc10d39432a2c (patch)
tree6f9dcda346f99893c44cacaae451026376bac654
parentd3f6df4c1f6b9bc50d0d125a664eefad395990a6 (diff)
downloadvulns-e11fe7c476b0e92bd301ed46662fc10d39432a2c.tar.gz
create CVE-2024-26651
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--cve/published/2024/CVE-2024-26651 (renamed from cve/reserved/2024/CVE-2024-26651)0
-rw-r--r--cve/published/2024/CVE-2024-26651.json193
-rw-r--r--cve/published/2024/CVE-2024-26651.mbox79
-rw-r--r--cve/published/2024/CVE-2024-26651.sha11
4 files changed, 273 insertions, 0 deletions
diff --git a/cve/reserved/2024/CVE-2024-26651 b/cve/published/2024/CVE-2024-26651
index e69de29b..e69de29b 100644
--- a/cve/reserved/2024/CVE-2024-26651
+++ b/cve/published/2024/CVE-2024-26651
diff --git a/cve/published/2024/CVE-2024-26651.json b/cve/published/2024/CVE-2024-26651.json
new file mode 100644
index 00000000..9c7b3645
--- /dev/null
+++ b/cve/published/2024/CVE-2024-26651.json
@@ -0,0 +1,193 @@
+{
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
+ },
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsr9800: Add check for usbnet_get_endpoints\n\nAdd check for usbnet_get_endpoints() and return the error if it fails\nin order to transfer the error."
+ }
+ ],
+ "affected": [
+ {
+ "product": "Linux",
+ "vendor": "Linux",
+ "defaultStatus": "unaffected",
+ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
+ "versions": [
+ {
+ "version": "19a38d8e0aa3",
+ "lessThan": "424eba06ed40",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "19a38d8e0aa3",
+ "lessThan": "8a8b6a24684b",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "19a38d8e0aa3",
+ "lessThan": "6b4a39acafaf",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "19a38d8e0aa3",
+ "lessThan": "276873ae26c8",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "19a38d8e0aa3",
+ "lessThan": "9c402819620a",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "19a38d8e0aa3",
+ "lessThan": "e39a3a14eafc",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "19a38d8e0aa3",
+ "lessThan": "efba65777f98",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "19a38d8e0aa3",
+ "lessThan": "f546cc19f9b8",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "19a38d8e0aa3",
+ "lessThan": "07161b2416f7",
+ "status": "affected",
+ "versionType": "git"
+ }
+ ]
+ },
+ {
+ "product": "Linux",
+ "vendor": "Linux",
+ "defaultStatus": "affected",
+ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
+ "versions": [
+ {
+ "version": "3.14",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "3.14",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "4.19.311",
+ "lessThanOrEqual": "4.19.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "5.4.273",
+ "lessThanOrEqual": "5.4.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "5.10.214",
+ "lessThanOrEqual": "5.10.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "5.15.153",
+ "lessThanOrEqual": "5.15.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.1.83",
+ "lessThanOrEqual": "6.1.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.6.23",
+ "lessThanOrEqual": "6.6.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.7.11",
+ "lessThanOrEqual": "6.7.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.8.2",
+ "lessThanOrEqual": "6.8.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.9-rc1",
+ "lessThanOrEqual": "*",
+ "status": "unaffected",
+ "versionType": "original_commit_for_fix"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://git.kernel.org/stable/c/424eba06ed405d557077339edb19ce0ebe39e7c7"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/8a8b6a24684bc278036c3f159f7b3a31ad89546a"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/6b4a39acafaf0186ed8e97c16e0aa6fca0e52009"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/276873ae26c8d75b00747c1dadb9561d6ef20581"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/9c402819620a842cbfe39359a3ddfaac9adc8384"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/e39a3a14eafcf17f03c037290b78c8f483529028"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/efba65777f98457773c5b65e3135c6132d3b015f"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/f546cc19f9b82975238d0ba413adc27714750774"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/07161b2416f740a2cb87faa5566873f401440a61"
+ }
+ ],
+ "title": "sr9800: Add check for usbnet_get_endpoints",
+ "x_generator": {
+ "engine": "bippy-b4257b672505"
+ }
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
+ "cveID": "CVE-2024-26651",
+ "requesterUserId": "gregkh@kernel.org",
+ "serial": "1",
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+}
diff --git a/cve/published/2024/CVE-2024-26651.mbox b/cve/published/2024/CVE-2024-26651.mbox
new file mode 100644
index 00000000..5640712b
--- /dev/null
+++ b/cve/published/2024/CVE-2024-26651.mbox
@@ -0,0 +1,79 @@
+From bippy-b4257b672505 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+To: <linux-cve-announce@vger.kernel.org>
+Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
+Subject: CVE-2024-26651: sr9800: Add check for usbnet_get_endpoints
+Message-Id: <2024032721-CVE-2024-26651-34b3@gregkh>
+Content-Length: 2890
+Lines: 62
+X-Developer-Signature: v=1; a=openpgp-sha256; l=2953;
+ i=gregkh@linuxfoundation.org; h=from:subject:message-id;
+ bh=z0/rgo7JDvp6cPPJlKVqORnFMHMujyiavPTAB/6vGys=;
+ b=owGbwMvMwCRo6H6F97bub03G02pJDGksKpGZck1rK6UzUq/9qw/LnMWr57rnHHMJG89S+fQp/
+ RsXnVPriGVhEGRikBVTZPmyjefo/opDil6Gtqdh5rAygQxh4OIUgIk8kWOYX71BZNaya6zMS3xX
+ 5TUs+GyidaVCm2HB7upPbxQObbkacfFp7YMoH5uT+w6KAAA=
+X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
+ fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
+
+Description
+===========
+
+In the Linux kernel, the following vulnerability has been resolved:
+
+sr9800: Add check for usbnet_get_endpoints
+
+Add check for usbnet_get_endpoints() and return the error if it fails
+in order to transfer the error.
+
+The Linux kernel CVE team has assigned CVE-2024-26651 to this issue.
+
+
+Affected and fixed versions
+===========================
+
+ Issue introduced in 3.14 with commit 19a38d8e0aa3 and fixed in 4.19.311 with commit 424eba06ed40
+ Issue introduced in 3.14 with commit 19a38d8e0aa3 and fixed in 5.4.273 with commit 8a8b6a24684b
+ Issue introduced in 3.14 with commit 19a38d8e0aa3 and fixed in 5.10.214 with commit 6b4a39acafaf
+ Issue introduced in 3.14 with commit 19a38d8e0aa3 and fixed in 5.15.153 with commit 276873ae26c8
+ Issue introduced in 3.14 with commit 19a38d8e0aa3 and fixed in 6.1.83 with commit 9c402819620a
+ Issue introduced in 3.14 with commit 19a38d8e0aa3 and fixed in 6.6.23 with commit e39a3a14eafc
+ Issue introduced in 3.14 with commit 19a38d8e0aa3 and fixed in 6.7.11 with commit efba65777f98
+ Issue introduced in 3.14 with commit 19a38d8e0aa3 and fixed in 6.8.2 with commit f546cc19f9b8
+ Issue introduced in 3.14 with commit 19a38d8e0aa3 and fixed in 6.9-rc1 with commit 07161b2416f7
+
+Please see https://www.kernel.org for a full list of currently supported
+kernel versions by the kernel community.
+
+Unaffected versions might change over time as fixes are backported to
+older supported kernel versions. The official CVE entry at
+ https://cve.org/CVERecord/?id=CVE-2024-26651
+will be updated if fixes are backported, please check that for the most
+up to date information about this issue.
+
+
+Affected files
+==============
+
+The file(s) affected by this issue are:
+ drivers/net/usb/sr9800.c
+
+
+Mitigation
+==========
+
+The Linux kernel CVE team recommends that you update to the latest
+stable kernel version for this, and many other bugfixes. Individual
+changes are never tested alone, but rather are part of a larger kernel
+release. Cherry-picking individual commits is not recommended or
+supported by the Linux kernel community at all. If however, updating to
+the latest release is impossible, the individual changes to resolve this
+issue can be found at these commits:
+ https://git.kernel.org/stable/c/424eba06ed405d557077339edb19ce0ebe39e7c7
+ https://git.kernel.org/stable/c/8a8b6a24684bc278036c3f159f7b3a31ad89546a
+ https://git.kernel.org/stable/c/6b4a39acafaf0186ed8e97c16e0aa6fca0e52009
+ https://git.kernel.org/stable/c/276873ae26c8d75b00747c1dadb9561d6ef20581
+ https://git.kernel.org/stable/c/9c402819620a842cbfe39359a3ddfaac9adc8384
+ https://git.kernel.org/stable/c/e39a3a14eafcf17f03c037290b78c8f483529028
+ https://git.kernel.org/stable/c/efba65777f98457773c5b65e3135c6132d3b015f
+ https://git.kernel.org/stable/c/f546cc19f9b82975238d0ba413adc27714750774
+ https://git.kernel.org/stable/c/07161b2416f740a2cb87faa5566873f401440a61
diff --git a/cve/published/2024/CVE-2024-26651.sha1 b/cve/published/2024/CVE-2024-26651.sha1
new file mode 100644
index 00000000..e65f83fa
--- /dev/null
+++ b/cve/published/2024/CVE-2024-26651.sha1
@@ -0,0 +1 @@
+07161b2416f740a2cb87faa5566873f401440a61