diff options
author | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-04-17 12:03:24 +0200 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-04-17 12:03:24 +0200 |
commit | 2c1316e0788581440b2c3a811e960a7d36d1c12f (patch) | |
tree | 64be30072e5431614c982ed19b7cece4f6fd4873 | |
parent | 9938eb2088b4fe570cf0623c43ddc19a838d6cb9 (diff) | |
download | vulns-2c1316e0788581440b2c3a811e960a7d36d1c12f.tar.gz |
assign CVE-2024-26829
Looks odd for 5.10, and maybe should not have been applied there...
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | cve/published/2024/CVE-2024-26829 (renamed from cve/reserved/2024/CVE-2024-26829) | 0 | ||||
-rw-r--r-- | cve/published/2024/CVE-2024-26829.json | 148 | ||||
-rw-r--r-- | cve/published/2024/CVE-2024-26829.mbox | 73 | ||||
-rw-r--r-- | cve/published/2024/CVE-2024-26829.sha1 | 1 |
4 files changed, 222 insertions, 0 deletions
diff --git a/cve/reserved/2024/CVE-2024-26829 b/cve/published/2024/CVE-2024-26829 index e69de29b..e69de29b 100644 --- a/cve/reserved/2024/CVE-2024-26829 +++ b/cve/published/2024/CVE-2024-26829 diff --git a/cve/published/2024/CVE-2024-26829.json b/cve/published/2024/CVE-2024-26829.json new file mode 100644 index 00000000..a4445fd9 --- /dev/null +++ b/cve/published/2024/CVE-2024-26829.json @@ -0,0 +1,148 @@ +{ + "containers": { + "cna": { + "providerMetadata": { + "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" + }, + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: ir_toy: fix a memleak in irtoy_tx\n\nWhen irtoy_command fails, buf should be freed since it is allocated by\nirtoy_tx, or there is a memleak." + } + ], + "affected": [ + { + "product": "Linux", + "vendor": "Linux", + "defaultStatus": "unaffected", + "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", + "versions": [ + { + "version": "4114978dcd24", + "lessThan": "486a4176bc78", + "status": "affected", + "versionType": "git" + }, + { + "version": "a4ac45aff8d3", + "lessThan": "207557e393a1", + "status": "affected", + "versionType": "git" + }, + { + "version": "4114978dcd24", + "lessThan": "be76ad74a43f", + "status": "affected", + "versionType": "git" + }, + { + "version": "4114978dcd24", + "lessThan": "7219a692ffc0", + "status": "affected", + "versionType": "git" + }, + { + "version": "4114978dcd24", + "lessThan": "b37259448bbc", + "status": "affected", + "versionType": "git" + }, + { + "version": "4114978dcd24", + "lessThan": "dc9ceb90c4b4", + "status": "affected", + "versionType": "git" + } + ] + }, + { + "product": "Linux", + "vendor": "Linux", + "defaultStatus": "affected", + "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", + "versions": [ + { + "version": "5.16", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.16", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.210", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.15.149", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.1.79", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.6.18", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.7.6", + "lessThanOrEqual": "6.7.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.8", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ] + } + ], + "references": [ + { + "url": "https://git.kernel.org/stable/c/486a4176bc783df798bce2903824801af8d2c3ae" + }, + { + "url": "https://git.kernel.org/stable/c/207557e393a135c1b6fe1df7cc0741d2c1789fff" + }, + { + "url": "https://git.kernel.org/stable/c/be76ad74a43f90f340f9f479e6b04f02125f6aef" + }, + { + "url": "https://git.kernel.org/stable/c/7219a692ffc00089015ada33b85b334d1a4b6e8e" + }, + { + "url": "https://git.kernel.org/stable/c/b37259448bbc70af1d0e52a9dd5559a9c29c9621" + }, + { + "url": "https://git.kernel.org/stable/c/dc9ceb90c4b42c6e5c6757df1d6257110433788e" + } + ], + "title": "media: ir_toy: fix a memleak in irtoy_tx", + "x_generator": { + "engine": "bippy-d175d3acf727" + } + } + }, + "cveMetadata": { + "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", + "cveID": "CVE-2024-26829", + "requesterUserId": "gregkh@kernel.org", + "serial": "1", + "state": "PUBLISHED" + }, + "dataType": "CVE_RECORD", + "dataVersion": "5.0" +} diff --git a/cve/published/2024/CVE-2024-26829.mbox b/cve/published/2024/CVE-2024-26829.mbox new file mode 100644 index 00000000..63949b99 --- /dev/null +++ b/cve/published/2024/CVE-2024-26829.mbox @@ -0,0 +1,73 @@ +From bippy-d175d3acf727 Mon Sep 17 00:00:00 2001 +From: Greg Kroah-Hartman <gregkh@linuxfoundation.org> +To: <linux-cve-announce@vger.kernel.org> +Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org> +Subject: CVE-2024-26829: media: ir_toy: fix a memleak in irtoy_tx +Message-Id: <2024041716-CVE-2024-26829-e879@gregkh> +Content-Length: 2377 +Lines: 56 +X-Developer-Signature: v=1; a=openpgp-sha256; l=2434; + i=gregkh@linuxfoundation.org; h=from:subject:message-id; + bh=LObf2DkHmgTBSUlPGfb7Flj6D0KyLCvvRzBngHRv5u4=; + b=owGbwMvMwCRo6H6F97bub03G02pJDGny81IfLbly9+vrIKNjd+epubXnRTczHV9fvn7mH9/71 + eJPOv7HdsSyMAgyMciKKbJ82cZzdH/FIUUvQ9vTMHNYmUCGMHBxCsBEZrExLJirZ7CT73FNlaPl + munB2y/9Nxdf+YthQeNV4SqRhsvb/n8Ryd6nk382mSt2OQA= +X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp; + fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29 + +Description +=========== + +In the Linux kernel, the following vulnerability has been resolved: + +media: ir_toy: fix a memleak in irtoy_tx + +When irtoy_command fails, buf should be freed since it is allocated by +irtoy_tx, or there is a memleak. + +The Linux kernel CVE team has assigned CVE-2024-26829 to this issue. + + +Affected and fixed versions +=========================== + + Issue introduced in 5.16 with commit 4114978dcd24 and fixed in 5.10.210 with commit 486a4176bc78 + Issue introduced in 5.15.54 with commit a4ac45aff8d3 and fixed in 5.15.149 with commit 207557e393a1 + Issue introduced in 5.16 with commit 4114978dcd24 and fixed in 6.1.79 with commit be76ad74a43f + Issue introduced in 5.16 with commit 4114978dcd24 and fixed in 6.6.18 with commit 7219a692ffc0 + Issue introduced in 5.16 with commit 4114978dcd24 and fixed in 6.7.6 with commit b37259448bbc + Issue introduced in 5.16 with commit 4114978dcd24 and fixed in 6.8 with commit dc9ceb90c4b4 + +Please see https://www.kernel.org for a full list of currently supported +kernel versions by the kernel community. + +Unaffected versions might change over time as fixes are backported to +older supported kernel versions. The official CVE entry at + https://cve.org/CVERecord/?id=CVE-2024-26829 +will be updated if fixes are backported, please check that for the most +up to date information about this issue. + + +Affected files +============== + +The file(s) affected by this issue are: + drivers/media/rc/ir_toy.c + + +Mitigation +========== + +The Linux kernel CVE team recommends that you update to the latest +stable kernel version for this, and many other bugfixes. Individual +changes are never tested alone, but rather are part of a larger kernel +release. Cherry-picking individual commits is not recommended or +supported by the Linux kernel community at all. If however, updating to +the latest release is impossible, the individual changes to resolve this +issue can be found at these commits: + https://git.kernel.org/stable/c/486a4176bc783df798bce2903824801af8d2c3ae + https://git.kernel.org/stable/c/207557e393a135c1b6fe1df7cc0741d2c1789fff + https://git.kernel.org/stable/c/be76ad74a43f90f340f9f479e6b04f02125f6aef + https://git.kernel.org/stable/c/7219a692ffc00089015ada33b85b334d1a4b6e8e + https://git.kernel.org/stable/c/b37259448bbc70af1d0e52a9dd5559a9c29c9621 + https://git.kernel.org/stable/c/dc9ceb90c4b42c6e5c6757df1d6257110433788e diff --git a/cve/published/2024/CVE-2024-26829.sha1 b/cve/published/2024/CVE-2024-26829.sha1 new file mode 100644 index 00000000..4d92eb0f --- /dev/null +++ b/cve/published/2024/CVE-2024-26829.sha1 @@ -0,0 +1 @@ +dc9ceb90c4b42c6e5c6757df1d6257110433788e |