CVE-2024-56662

Source
https://cve.org/CVERecord?id=CVE-2024-56662
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56662.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56662
Downstream
Related
Published
2024-12-27T15:06:24.661Z
Modified
2026-03-20T12:40:58.005919Z
Severity
  • 6.0 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
Details

In the Linux kernel, the following vulnerability has been resolved:

acpi: nfit: vmalloc-out-of-bounds Read in acpinfitctl

Fix an issue detected by syzbot with KASAN:

BUG: KASAN: vmalloc-out-of-bounds in cmdtofunc drivers/acpi/nfit/ core.c:416 [inline] BUG: KASAN: vmalloc-out-of-bounds in acpinfitctl+0x20e8/0x24a0 drivers/acpi/nfit/core.c:459

The issue occurs in cmdtofunc when the callpkg->ndreserved2 array is accessed without verifying that callpkg points to a buffer that is appropriately sized as a struct ndcmd_pkg. This can lead to out-of-bounds access and undefined behavior if the buffer does not have sufficient space.

To address this, a check was added in acpinfitctl() to ensure that buf is not NULL and that buflen is less than sizeof(*callpkg) before accessing it. This ensures safe access to the members of callpkg, including the ndreserved2 array.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56662.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ebe9f6f19d80d8978d16078dff3d5bd93ad8d102
Fixed
616aa5f3c86e0479bcbb81e41c08c43ff32af637
Fixed
bbdb3307f609ec4dc9558770f464ede01fe52aed
Fixed
143f723e9eb4f0302ffb7adfdc7ef77eab3f68e0
Fixed
e08dc2dc3c3f7938df0e4476fe3e6fdec5583c1d
Fixed
212846fafb753a48e869e2a342fc1e24048da771
Fixed
265e98f72bac6c41a4492d3e30a8e5fd22fe0779
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
63108f2a408abea7ecab063efa0f398da4d0d14b
Last affected
f5878c4f084dc6b1386dad03970bb61ad5e9dc4b
Last affected
0c79794474895dbbc3c52225f7e9f73cfecbb7dd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56662.json"