aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-13 13:17:20 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-04-13 13:17:20 +0200
commitade9c13379fb30562c67894b6b9842c89f8554d2 (patch)
tree148a271b37951d7570a084ddf697b4b8018f1f38
parent37755fc3db24d350bfa7c6c47a4b183d2d2363c9 (diff)
downloadvulns-ade9c13379fb30562c67894b6b9842c89f8554d2.tar.gz
CVE-2024-26817 allocated
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--cve/published/2024/CVE-2024-26817 (renamed from cve/reserved/2024/CVE-2024-26817)0
-rw-r--r--cve/published/2024/CVE-2024-26817.json153
-rw-r--r--cve/published/2024/CVE-2024-26817.mbox75
-rw-r--r--cve/published/2024/CVE-2024-26817.sha11
4 files changed, 229 insertions, 0 deletions
diff --git a/cve/reserved/2024/CVE-2024-26817 b/cve/published/2024/CVE-2024-26817
index e69de29b..e69de29b 100644
--- a/cve/reserved/2024/CVE-2024-26817
+++ b/cve/published/2024/CVE-2024-26817
diff --git a/cve/published/2024/CVE-2024-26817.json b/cve/published/2024/CVE-2024-26817.json
new file mode 100644
index 00000000..5202b336
--- /dev/null
+++ b/cve/published/2024/CVE-2024-26817.json
@@ -0,0 +1,153 @@
+{
+ "containers": {
+ "cna": {
+ "providerMetadata": {
+ "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
+ },
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In the Linux kernel, the following vulnerability has been resolved:\n\namdkfd: use calloc instead of kzalloc to avoid integer overflow\n\nThis uses calloc instead of doing the multiplication which might\noverflow."
+ }
+ ],
+ "affected": [
+ {
+ "product": "Linux",
+ "vendor": "Linux",
+ "defaultStatus": "unaffected",
+ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
+ "versions": [
+ {
+ "version": "1da177e4c3f4",
+ "lessThan": "e6721ea845fc",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "1da177e4c3f4",
+ "lessThan": "8b0564704255",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "1da177e4c3f4",
+ "lessThan": "fcbd99b3c733",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "1da177e4c3f4",
+ "lessThan": "cbac7de1d990",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "1da177e4c3f4",
+ "lessThan": "e6768c6737f4",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "1da177e4c3f4",
+ "lessThan": "315eb3c2df7e",
+ "status": "affected",
+ "versionType": "git"
+ },
+ {
+ "version": "1da177e4c3f4",
+ "lessThan": "0c33d1115394",
+ "status": "affected",
+ "versionType": "git"
+ }
+ ]
+ },
+ {
+ "product": "Linux",
+ "vendor": "Linux",
+ "defaultStatus": "affected",
+ "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
+ "versions": [
+ {
+ "version": "4.19.312",
+ "lessThanOrEqual": "4.19.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "5.4.274",
+ "lessThanOrEqual": "5.4.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "5.10.215",
+ "lessThanOrEqual": "5.10.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "5.15.155",
+ "lessThanOrEqual": "5.15.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.1.86",
+ "lessThanOrEqual": "6.1.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.6.27",
+ "lessThanOrEqual": "6.6.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ },
+ {
+ "version": "6.8.6",
+ "lessThanOrEqual": "6.8.*",
+ "status": "unaffected",
+ "versionType": "custom"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://git.kernel.org/stable/c/e6721ea845fcb93a764a92bd40f1afc0d6c69751"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/8b0564704255c6b3c6a7188e86939f754e1577c0"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/fcbd99b3c73309107e3be71f20dff9414df64f91"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/cbac7de1d9901521e78cdc34e15451df3611f2ad"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/e6768c6737f4c02cba193a3339f0cc2907f0b86a"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/315eb3c2df7e4cb18e3eacfa18a53a46f2bf0ef7"
+ },
+ {
+ "url": "https://git.kernel.org/stable/c/0c33d11153949310d76631d8f4a4736519eacd3a"
+ }
+ ],
+ "title": "amdkfd: use calloc instead of kzalloc to avoid integer overflow",
+ "x_generator": {
+ "engine": "bippy-d175d3acf727"
+ }
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
+ "cveID": "CVE-2024-26817",
+ "requesterUserId": "gregkh@kernel.org",
+ "serial": "1",
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+}
diff --git a/cve/published/2024/CVE-2024-26817.mbox b/cve/published/2024/CVE-2024-26817.mbox
new file mode 100644
index 00000000..03057fca
--- /dev/null
+++ b/cve/published/2024/CVE-2024-26817.mbox
@@ -0,0 +1,75 @@
+From bippy-d175d3acf727 Mon Sep 17 00:00:00 2001
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+To: <linux-cve-announce@vger.kernel.org>
+Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
+Subject: CVE-2024-26817: amdkfd: use calloc instead of kzalloc to avoid integer overflow
+Message-Id: <2024041311-CVE-2024-26817-e1a0@gregkh>
+Content-Length: 2181
+Lines: 58
+X-Developer-Signature: v=1; a=openpgp-sha256; l=2240;
+ i=gregkh@linuxfoundation.org; h=from:subject:message-id;
+ bh=51l9Is09QmxtpZnALwdbJYO58G2TztUQP/w7UwroU5k=;
+ b=owGbwMvMwCRo6H6F97bub03G02pJDGlSmdvPeK65nMx6+KzXgfWLw5YvFXksn3e4bGabx6Tog
+ 09TPs+w64hlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJdLMwzM85U7ruV6rP3COf
+ s6Jf3/5SV924+zDDggNv8y+zcMvO4Qo7nHZzR2L0pKZFywA=
+X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp;
+ fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29
+
+Description
+===========
+
+In the Linux kernel, the following vulnerability has been resolved:
+
+amdkfd: use calloc instead of kzalloc to avoid integer overflow
+
+This uses calloc instead of doing the multiplication which might
+overflow.
+
+The Linux kernel CVE team has assigned CVE-2024-26817 to this issue.
+
+
+Affected and fixed versions
+===========================
+
+ Fixed in 4.19.312 with commit e6721ea845fc
+ Fixed in 5.4.274 with commit 8b0564704255
+ Fixed in 5.10.215 with commit fcbd99b3c733
+ Fixed in 5.15.155 with commit cbac7de1d990
+ Fixed in 6.1.86 with commit e6768c6737f4
+ Fixed in 6.6.27 with commit 315eb3c2df7e
+ Fixed in 6.8.6 with commit 0c33d1115394
+
+Please see https://www.kernel.org for a full list of currently supported
+kernel versions by the kernel community.
+
+Unaffected versions might change over time as fixes are backported to
+older supported kernel versions. The official CVE entry at
+ https://cve.org/CVERecord/?id=CVE-2024-26817
+will be updated if fixes are backported, please check that for the most
+up to date information about this issue.
+
+
+Affected files
+==============
+
+The file(s) affected by this issue are:
+ drivers/gpu/drm/amd/amdkfd/kfd_chardev.c
+
+
+Mitigation
+==========
+
+The Linux kernel CVE team recommends that you update to the latest
+stable kernel version for this, and many other bugfixes. Individual
+changes are never tested alone, but rather are part of a larger kernel
+release. Cherry-picking individual commits is not recommended or
+supported by the Linux kernel community at all. If however, updating to
+the latest release is impossible, the individual changes to resolve this
+issue can be found at these commits:
+ https://git.kernel.org/stable/c/e6721ea845fcb93a764a92bd40f1afc0d6c69751
+ https://git.kernel.org/stable/c/8b0564704255c6b3c6a7188e86939f754e1577c0
+ https://git.kernel.org/stable/c/fcbd99b3c73309107e3be71f20dff9414df64f91
+ https://git.kernel.org/stable/c/cbac7de1d9901521e78cdc34e15451df3611f2ad
+ https://git.kernel.org/stable/c/e6768c6737f4c02cba193a3339f0cc2907f0b86a
+ https://git.kernel.org/stable/c/315eb3c2df7e4cb18e3eacfa18a53a46f2bf0ef7
+ https://git.kernel.org/stable/c/0c33d11153949310d76631d8f4a4736519eacd3a
diff --git a/cve/published/2024/CVE-2024-26817.sha1 b/cve/published/2024/CVE-2024-26817.sha1
new file mode 100644
index 00000000..368bd516
--- /dev/null
+++ b/cve/published/2024/CVE-2024-26817.sha1
@@ -0,0 +1 @@
+3b0daecfeac0103aba8b293df07a0cbaf8b43f29