CVE-2024-56662

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-56662
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56662.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56662
Downstream
Related
Published
2024-12-27T15:06:24.661Z
Modified
2025-11-28T02:34:51.315942Z
Severity
  • 6.0 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
Details

In the Linux kernel, the following vulnerability has been resolved:

acpi: nfit: vmalloc-out-of-bounds Read in acpinfitctl

Fix an issue detected by syzbot with KASAN:

BUG: KASAN: vmalloc-out-of-bounds in cmdtofunc drivers/acpi/nfit/ core.c:416 [inline] BUG: KASAN: vmalloc-out-of-bounds in acpinfitctl+0x20e8/0x24a0 drivers/acpi/nfit/core.c:459

The issue occurs in cmdtofunc when the callpkg->ndreserved2 array is accessed without verifying that callpkg points to a buffer that is appropriately sized as a struct ndcmd_pkg. This can lead to out-of-bounds access and undefined behavior if the buffer does not have sufficient space.

To address this, a check was added in acpinfitctl() to ensure that buf is not NULL and that buflen is less than sizeof(*callpkg) before accessing it. This ensures safe access to the members of callpkg, including the ndreserved2 array.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56662.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ebe9f6f19d80d8978d16078dff3d5bd93ad8d102
Fixed
616aa5f3c86e0479bcbb81e41c08c43ff32af637
Fixed
bbdb3307f609ec4dc9558770f464ede01fe52aed
Fixed
143f723e9eb4f0302ffb7adfdc7ef77eab3f68e0
Fixed
e08dc2dc3c3f7938df0e4476fe3e6fdec5583c1d
Fixed
212846fafb753a48e869e2a342fc1e24048da771
Fixed
265e98f72bac6c41a4492d3e30a8e5fd22fe0779
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
63108f2a408abea7ecab063efa0f398da4d0d14b
Last affected
f5878c4f084dc6b1386dad03970bb61ad5e9dc4b
Last affected
0c79794474895dbbc3c52225f7e9f73cfecbb7dd

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.1.0
Fixed
5.10.232
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.175
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.121
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.67
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.6