aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-17 12:03:24 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-17 12:03:24 +0200
commit2c1316e0788581440b2c3a811e960a7d36d1c12f (patch)
tree64be30072e5431614c982ed19b7cece4f6fd4873
parent9938eb2088b4fe570cf0623c43ddc19a838d6cb9 (diff)
downloadvulns-2c1316e0788581440b2c3a811e960a7d36d1c12f.tar.gz
assign CVE-2024-26829
Looks odd for 5.10, and maybe should not have been applied there... Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--cve/published/2024/CVE-2024-26829 (renamed from cve/reserved/2024/CVE-2024-26829)0
-rw-r--r--cve/published/2024/CVE-2024-26829.json148
-rw-r--r--cve/published/2024/CVE-2024-26829.mbox73
-rw-r--r--cve/published/2024/CVE-2024-26829.sha11
4 files changed, 222 insertions, 0 deletions
diff --git a/cve/reserved/2024/CVE-2024-26829 b/cve/published/2024/CVE-2024-26829
index e69de29b..e69de29b 100644
--- a/cve/reserved/2024/CVE-2024-26829
+++ b/cve/published/2024/CVE-2024-26829
diff --git a/cve/published/2024/CVE-2024-26829.json b/cve/published/2024/CVE-2024-26829.json
new file mode 100644
index 00000000..a4445fd9
--- /dev/null
+++ b/cve/published/2024/CVE-2024-26829.json
@@ -0,0 +1,148 @@
+{
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
+ },
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: ir_toy: fix a memleak in irtoy_tx\n\nWhen irtoy_command fails, buf should be freed since it is allocated by\nirtoy_tx, or there is a memleak."
+ }
+ ],
+ "affected": [
+ {
+ "product": "Linux",
+ "vendor": "Linux",
+ "defaultStatus": "unaffected",
+ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
+ "versions": [
+ {
+ "version": "4114978dcd24",
+ "lessThan": "486a4176bc78",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "a4ac45aff8d3",
+ "lessThan": "207557e393a1",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "4114978dcd24",
+ "lessThan": "be76ad74a43f",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "4114978dcd24",
+ "lessThan": "7219a692ffc0",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "4114978dcd24",
+ "lessThan": "b37259448bbc",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "4114978dcd24",
+ "lessThan": "dc9ceb90c4b4",
+ "status": "affected",
+ "versionType": "git"
+ }
+ ]
+ },
+ {
+ "product": "Linux",
+ "vendor": "Linux",
+ "defaultStatus": "affected",
+ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
+ "versions": [
+ {
+ "version": "5.16",
+ "status": "affected"
+ },
+ {
+ "version": "0",
+ "lessThan": "5.16",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "5.10.210",
+ "lessThanOrEqual": "5.10.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "5.15.149",
+ "lessThanOrEqual": "5.15.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.1.79",
+ "lessThanOrEqual": "6.1.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.6.18",
+ "lessThanOrEqual": "6.6.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.7.6",
+ "lessThanOrEqual": "6.7.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.8",
+ "lessThanOrEqual": "*",
+ "status": "unaffected",
+ "versionType": "original_commit_for_fix"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://git.kernel.org/stable/c/486a4176bc783df798bce2903824801af8d2c3ae"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/207557e393a135c1b6fe1df7cc0741d2c1789fff"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/be76ad74a43f90f340f9f479e6b04f02125f6aef"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/7219a692ffc00089015ada33b85b334d1a4b6e8e"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/b37259448bbc70af1d0e52a9dd5559a9c29c9621"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/dc9ceb90c4b42c6e5c6757df1d6257110433788e"
+ }
+ ],
+ "title": "media: ir_toy: fix a memleak in irtoy_tx",
+ "x_generator": {
+ "engine": "bippy-d175d3acf727"
+ }
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
+ "cveID": "CVE-2024-26829",
+ "requesterUserId": "gregkh@kernel.org",
+ "serial": "1",
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+}
diff --git a/cve/published/2024/CVE-2024-26829.mbox b/cve/published/2024/CVE-2024-26829.mbox
new file mode 100644
index 00000000..63949b99
--- /dev/null
+++ b/cve/published/2024/CVE-2024-26829.mbox
@@ -0,0 +1,73 @@
+From bippy-d175d3acf727 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+To: <linux-cve-announce@vger.kernel.org>
+Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
+Subject: CVE-2024-26829: media: ir_toy: fix a memleak in irtoy_tx
+Message-Id: <2024041716-CVE-2024-26829-e879@gregkh>
+Content-Length: 2377
+Lines: 56
+X-Developer-Signature: v=1; a=openpgp-sha256; l=2434;
+ i=gregkh@linuxfoundation.org; h=from:subject:message-id;
+ bh=LObf2DkHmgTBSUlPGfb7Flj6D0KyLCvvRzBngHRv5u4=;
+ b=owGbwMvMwCRo6H6F97bub03G02pJDGny81IfLbly9+vrIKNjd+epubXnRTczHV9fvn7mH9/71
+ eJPOv7HdsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEZrExLJirZ7CT73FNlaPl
+ munB2y/9Nxdf+YthQeNV4SqRhsvb/n8Ryd6nk382mSt2OQA=
+X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
+ fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
+
+Description
+===========
+
+In the Linux kernel, the following vulnerability has been resolved:
+
+media: ir_toy: fix a memleak in irtoy_tx
+
+When irtoy_command fails, buf should be freed since it is allocated by
+irtoy_tx, or there is a memleak.
+
+The Linux kernel CVE team has assigned CVE-2024-26829 to this issue.
+
+
+Affected and fixed versions
+===========================
+
+ Issue introduced in 5.16 with commit 4114978dcd24 and fixed in 5.10.210 with commit 486a4176bc78
+ Issue introduced in 5.15.54 with commit a4ac45aff8d3 and fixed in 5.15.149 with commit 207557e393a1
+ Issue introduced in 5.16 with commit 4114978dcd24 and fixed in 6.1.79 with commit be76ad74a43f
+ Issue introduced in 5.16 with commit 4114978dcd24 and fixed in 6.6.18 with commit 7219a692ffc0
+ Issue introduced in 5.16 with commit 4114978dcd24 and fixed in 6.7.6 with commit b37259448bbc
+ Issue introduced in 5.16 with commit 4114978dcd24 and fixed in 6.8 with commit dc9ceb90c4b4
+
+Please see https://www.kernel.org for a full list of currently supported
+kernel versions by the kernel community.
+
+Unaffected versions might change over time as fixes are backported to
+older supported kernel versions. The official CVE entry at
+ https://cve.org/CVERecord/?id=CVE-2024-26829
+will be updated if fixes are backported, please check that for the most
+up to date information about this issue.
+
+
+Affected files
+==============
+
+The file(s) affected by this issue are:
+ drivers/media/rc/ir_toy.c
+
+
+Mitigation
+==========
+
+The Linux kernel CVE team recommends that you update to the latest
+stable kernel version for this, and many other bugfixes. Individual
+changes are never tested alone, but rather are part of a larger kernel
+release. Cherry-picking individual commits is not recommended or
+supported by the Linux kernel community at all. If however, updating to
+the latest release is impossible, the individual changes to resolve this
+issue can be found at these commits:
+ https://git.kernel.org/stable/c/486a4176bc783df798bce2903824801af8d2c3ae
+ https://git.kernel.org/stable/c/207557e393a135c1b6fe1df7cc0741d2c1789fff
+ https://git.kernel.org/stable/c/be76ad74a43f90f340f9f479e6b04f02125f6aef
+ https://git.kernel.org/stable/c/7219a692ffc00089015ada33b85b334d1a4b6e8e
+ https://git.kernel.org/stable/c/b37259448bbc70af1d0e52a9dd5559a9c29c9621
+ https://git.kernel.org/stable/c/dc9ceb90c4b42c6e5c6757df1d6257110433788e
diff --git a/cve/published/2024/CVE-2024-26829.sha1 b/cve/published/2024/CVE-2024-26829.sha1
new file mode 100644
index 00000000..4d92eb0f
--- /dev/null
+++ b/cve/published/2024/CVE-2024-26829.sha1
@@ -0,0 +1 @@
+dc9ceb90c4b42c6e5c6757df1d6257110433788e