diff options
author | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-04-13 13:17:20 +0200 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-04-13 13:17:20 +0200 |
commit | ade9c13379fb30562c67894b6b9842c89f8554d2 (patch) | |
tree | 148a271b37951d7570a084ddf697b4b8018f1f38 | |
parent | 37755fc3db24d350bfa7c6c47a4b183d2d2363c9 (diff) | |
download | vulns-ade9c13379fb30562c67894b6b9842c89f8554d2.tar.gz |
CVE-2024-26817 allocated
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | cve/published/2024/CVE-2024-26817 (renamed from cve/reserved/2024/CVE-2024-26817) | 0 | ||||
-rw-r--r-- | cve/published/2024/CVE-2024-26817.json | 153 | ||||
-rw-r--r-- | cve/published/2024/CVE-2024-26817.mbox | 75 | ||||
-rw-r--r-- | cve/published/2024/CVE-2024-26817.sha1 | 1 |
4 files changed, 229 insertions, 0 deletions
diff --git a/cve/reserved/2024/CVE-2024-26817 b/cve/published/2024/CVE-2024-26817 index e69de29b..e69de29b 100644 --- a/cve/reserved/2024/CVE-2024-26817 +++ b/cve/published/2024/CVE-2024-26817 diff --git a/cve/published/2024/CVE-2024-26817.json b/cve/published/2024/CVE-2024-26817.json new file mode 100644 index 00000000..5202b336 --- /dev/null +++ b/cve/published/2024/CVE-2024-26817.json @@ -0,0 +1,153 @@ +{ + "containers": { + "cna": { + "providerMetadata": { + "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" + }, + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\namdkfd: use calloc instead of kzalloc to avoid integer overflow\n\nThis uses calloc instead of doing the multiplication which might\noverflow." + } + ], + "affected": [ + { + "product": "Linux", + "vendor": "Linux", + "defaultStatus": "unaffected", + "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", + "versions": [ + { + "version": "1da177e4c3f4", + "lessThan": "e6721ea845fc", + "status": "affected", + "versionType": "git" + }, + { + "version": "1da177e4c3f4", + "lessThan": "8b0564704255", + "status": "affected", + "versionType": "git" + }, + { + "version": "1da177e4c3f4", + "lessThan": "fcbd99b3c733", + "status": "affected", + "versionType": "git" + }, + { + "version": "1da177e4c3f4", + "lessThan": "cbac7de1d990", + "status": "affected", + "versionType": "git" + }, + { + "version": "1da177e4c3f4", + "lessThan": "e6768c6737f4", + "status": "affected", + "versionType": "git" + }, + { + "version": "1da177e4c3f4", + "lessThan": "315eb3c2df7e", + "status": "affected", + "versionType": "git" + }, + { + "version": "1da177e4c3f4", + "lessThan": "0c33d1115394", + "status": "affected", + "versionType": "git" + } + ] + }, + { + "product": "Linux", + "vendor": "Linux", + "defaultStatus": "affected", + "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", + "versions": [ + { + "version": "4.19.312", + "lessThanOrEqual": "4.19.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.4.274", + "lessThanOrEqual": "5.4.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.10.215", + "lessThanOrEqual": "5.10.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "5.15.155", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.1.86", + "lessThanOrEqual": "6.1.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.6.27", + "lessThanOrEqual": "6.6.*", + "status": "unaffected", + "versionType": "custom" + }, + { + "version": "6.8.6", + "lessThanOrEqual": "6.8.*", + "status": "unaffected", + "versionType": "custom" + } + ] + } + ], + "references": [ + { + "url": "https://git.kernel.org/stable/c/e6721ea845fcb93a764a92bd40f1afc0d6c69751" + }, + { + "url": "https://git.kernel.org/stable/c/8b0564704255c6b3c6a7188e86939f754e1577c0" + }, + { + "url": "https://git.kernel.org/stable/c/fcbd99b3c73309107e3be71f20dff9414df64f91" + }, + { + "url": "https://git.kernel.org/stable/c/cbac7de1d9901521e78cdc34e15451df3611f2ad" + }, + { + "url": "https://git.kernel.org/stable/c/e6768c6737f4c02cba193a3339f0cc2907f0b86a" + }, + { + "url": "https://git.kernel.org/stable/c/315eb3c2df7e4cb18e3eacfa18a53a46f2bf0ef7" + }, + { + "url": "https://git.kernel.org/stable/c/0c33d11153949310d76631d8f4a4736519eacd3a" + } + ], + "title": "amdkfd: use calloc instead of kzalloc to avoid integer overflow", + "x_generator": { + "engine": "bippy-d175d3acf727" + } + } + }, + "cveMetadata": { + "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", + "cveID": "CVE-2024-26817", + "requesterUserId": "gregkh@kernel.org", + "serial": "1", + "state": "PUBLISHED" + }, + "dataType": "CVE_RECORD", + "dataVersion": "5.0" +} diff --git a/cve/published/2024/CVE-2024-26817.mbox b/cve/published/2024/CVE-2024-26817.mbox new file mode 100644 index 00000000..03057fca --- /dev/null +++ b/cve/published/2024/CVE-2024-26817.mbox @@ -0,0 +1,75 @@ +From bippy-d175d3acf727 Mon Sep 17 00:00:00 2001 +From: Greg Kroah-Hartman <gregkh@linuxfoundation.org> +To: <linux-cve-announce@vger.kernel.org> +Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org> +Subject: CVE-2024-26817: amdkfd: use calloc instead of kzalloc to avoid integer overflow +Message-Id: <2024041311-CVE-2024-26817-e1a0@gregkh> +Content-Length: 2181 +Lines: 58 +X-Developer-Signature: v=1; a=openpgp-sha256; l=2240; + i=gregkh@linuxfoundation.org; h=from:subject:message-id; + bh=51l9Is09QmxtpZnALwdbJYO58G2TztUQP/w7UwroU5k=; + b=owGbwMvMwCRo6H6F97bub03G02pJDGlSmdvPeK65nMx6+KzXgfWLw5YvFXksn3e4bGabx6Tog + 09TPs+w64hlYRBkYpAVU2T5so3n6P6KQ4pehranYeawMoEMYeDiFICJdLMwzM85U7ruV6rP3COf + s6Jf3/5SV924+zDDggNv8y+zcMvO4Qo7nHZzR2L0pKZFywA= +X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp; + fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29 + +Description +=========== + +In the Linux kernel, the following vulnerability has been resolved: + +amdkfd: use calloc instead of kzalloc to avoid integer overflow + +This uses calloc instead of doing the multiplication which might +overflow. + +The Linux kernel CVE team has assigned CVE-2024-26817 to this issue. + + +Affected and fixed versions +=========================== + + Fixed in 4.19.312 with commit e6721ea845fc + Fixed in 5.4.274 with commit 8b0564704255 + Fixed in 5.10.215 with commit fcbd99b3c733 + Fixed in 5.15.155 with commit cbac7de1d990 + Fixed in 6.1.86 with commit e6768c6737f4 + Fixed in 6.6.27 with commit 315eb3c2df7e + Fixed in 6.8.6 with commit 0c33d1115394 + +Please see https://www.kernel.org for a full list of currently supported +kernel versions by the kernel community. + +Unaffected versions might change over time as fixes are backported to +older supported kernel versions. The official CVE entry at + https://cve.org/CVERecord/?id=CVE-2024-26817 +will be updated if fixes are backported, please check that for the most +up to date information about this issue. + + +Affected files +============== + +The file(s) affected by this issue are: + drivers/gpu/drm/amd/amdkfd/kfd_chardev.c + + +Mitigation +========== + +The Linux kernel CVE team recommends that you update to the latest +stable kernel version for this, and many other bugfixes. Individual +changes are never tested alone, but rather are part of a larger kernel +release. Cherry-picking individual commits is not recommended or +supported by the Linux kernel community at all. If however, updating to +the latest release is impossible, the individual changes to resolve this +issue can be found at these commits: + https://git.kernel.org/stable/c/e6721ea845fcb93a764a92bd40f1afc0d6c69751 + https://git.kernel.org/stable/c/8b0564704255c6b3c6a7188e86939f754e1577c0 + https://git.kernel.org/stable/c/fcbd99b3c73309107e3be71f20dff9414df64f91 + https://git.kernel.org/stable/c/cbac7de1d9901521e78cdc34e15451df3611f2ad + https://git.kernel.org/stable/c/e6768c6737f4c02cba193a3339f0cc2907f0b86a + https://git.kernel.org/stable/c/315eb3c2df7e4cb18e3eacfa18a53a46f2bf0ef7 + https://git.kernel.org/stable/c/0c33d11153949310d76631d8f4a4736519eacd3a diff --git a/cve/published/2024/CVE-2024-26817.sha1 b/cve/published/2024/CVE-2024-26817.sha1 new file mode 100644 index 00000000..368bd516 --- /dev/null +++ b/cve/published/2024/CVE-2024-26817.sha1 @@ -0,0 +1 @@ +3b0daecfeac0103aba8b293df07a0cbaf8b43f29 |