CVE-2024-40994

In the Linux kernel, the following vulnerability has been resolved: ptp: fix integer overflow in max_vclocks_store On 32bit systems, the "4 * max" multiply can overflow. Use kcalloc() to do the allocation to prevent this.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*

History

21 Nov 2024, 09:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/4b03da87d0b7074c93d9662c6e1a8939f9b8b86e - Patch () https://git.kernel.org/stable/c/4b03da87d0b7074c93d9662c6e1a8939f9b8b86e - Patch
References () https://git.kernel.org/stable/c/666e934d749e50a37f3796caaf843a605f115b6f - Patch () https://git.kernel.org/stable/c/666e934d749e50a37f3796caaf843a605f115b6f - Patch
References () https://git.kernel.org/stable/c/81d23d2a24012e448f651e007fac2cfd20a45ce0 - Patch () https://git.kernel.org/stable/c/81d23d2a24012e448f651e007fac2cfd20a45ce0 - Patch
References () https://git.kernel.org/stable/c/d50d62d5e6ee6aa03c00bddb91745d0b632d3b0f - Patch () https://git.kernel.org/stable/c/d50d62d5e6ee6aa03c00bddb91745d0b632d3b0f - Patch
References () https://git.kernel.org/stable/c/e1fccfb4638ee6188377867f6015d0ce35764a8e - Patch () https://git.kernel.org/stable/c/e1fccfb4638ee6188377867f6015d0ce35764a8e - Patch

21 Aug 2024, 16:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ptp: corrige el desbordamiento de enteros en max_vclocks_store En sistemas de 32 bits, la multiplicación "4 * max" puede desbordarse. Utilice kcalloc() para realizar la asignación y evitar esto.
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
CWE CWE-190
References () https://git.kernel.org/stable/c/4b03da87d0b7074c93d9662c6e1a8939f9b8b86e - () https://git.kernel.org/stable/c/4b03da87d0b7074c93d9662c6e1a8939f9b8b86e - Patch
References () https://git.kernel.org/stable/c/666e934d749e50a37f3796caaf843a605f115b6f - () https://git.kernel.org/stable/c/666e934d749e50a37f3796caaf843a605f115b6f - Patch
References () https://git.kernel.org/stable/c/81d23d2a24012e448f651e007fac2cfd20a45ce0 - () https://git.kernel.org/stable/c/81d23d2a24012e448f651e007fac2cfd20a45ce0 - Patch
References () https://git.kernel.org/stable/c/d50d62d5e6ee6aa03c00bddb91745d0b632d3b0f - () https://git.kernel.org/stable/c/d50d62d5e6ee6aa03c00bddb91745d0b632d3b0f - Patch
References () https://git.kernel.org/stable/c/e1fccfb4638ee6188377867f6015d0ce35764a8e - () https://git.kernel.org/stable/c/e1fccfb4638ee6188377867f6015d0ce35764a8e - Patch

12 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2024-11-21 09:32


NVD link : CVE-2024-40994

Mitre link : CVE-2024-40994

CVE.ORG link : CVE-2024-40994


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound