CVE-2024-46745

Source
https://cve.org/CVERecord?id=CVE-2024-46745
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46745.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-46745
Downstream
Related
Published
2024-09-18T07:12:05.798Z
Modified
2026-03-20T12:37:52.111941Z
Summary
Input: uinput - reject requests with unreasonable number of slots
Details

In the Linux kernel, the following vulnerability has been resolved:

Input: uinput - reject requests with unreasonable number of slots

When exercising uinput interface syzkaller may try setting up device with a really large number of slots, which causes memory allocation failure in inputmtinit_slots(). While this allocation failure is handled properly and request is rejected, it results in syzkaller reports. Additionally, such request may put undue burden on the system which will try to free a lot of memory for a bogus request.

Fix it by limiting allowed number of slots to 100. This can easily be extended if we see devices that can track more than 100 contacts.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46745.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
38e7afe96c7c0ad900824911c61fdb04078033dc
Fixed
9c6d189f0c1c59ba9a32326ec82a0b367a3cd47b
Fixed
597ff930296c4c8fc6b6a536884d4f1a7187ec70
Fixed
51fa08edd80003db700bdaa099385c5900d27f4b
Fixed
9719687398dea8a6a12a10321a54dd75eec7ab2d
Fixed
61df76619e270a46fd427fbdeb670ad491c42de2
Fixed
a4858b00a1ec57043697fb935565fe267f161833
Fixed
d76fc0f0b18d49b7e721c9e4975ef4bffde2f3e7
Fixed
206f533a0a7c683982af473079c4111f4a0f9f5e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46745.json"