CVE-2024-49850 – bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos
https://notcve.org/view.php?id=CVE-2024-49850
In the Linux kernel, the following vulnerability has been resolved: bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos In case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL referencing a non-existing BTF type, function bpf_core_calc_relo_insn would cause a null pointer deference. Fix this by adding a proper check upper in call stack, as malformed relocation records could be passed from user space. Simplest reproducer is a program: r0 = 0 exit With a single relocation record: .insn_off = 0, /* patch first instruction */ .type_id = 100500, /* this type id does not exist */ .access_str_off = 6, /* offset of string "0" */ .kind = BPF_CORE_TYPE_ID_LOCAL, See the link for original reproducer or next commit for a test case. • https://git.kernel.org/stable/c/74753e1462e77349525daf9eb60ea21ed92d3a97 https://git.kernel.org/stable/c/dc7ce14f00bcd50641f2110b7a32aa6552e0780f https://git.kernel.org/stable/c/2288b54b96dcb55bedebcef3572bb8821fc5e708 https://git.kernel.org/stable/c/584cd3ff792e1edbea20b2a7df55897159b0be3e https://git.kernel.org/stable/c/e7e9c5b2dda29067332df2a85b0141a92b41f218 https://git.kernel.org/stable/c/3d2786d65aaa954ebd3fcc033ada433e10da21c4 •
CVE-2024-47757 – nilfs2: fix potential oob read in nilfs_btree_check_delete()
https://notcve.org/view.php?id=CVE-2024-47757
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential oob read in nilfs_btree_check_delete() The function nilfs_btree_check_delete(), which checks whether degeneration to direct mapping occurs before deleting a b-tree entry, causes memory access outside the block buffer when retrieving the maximum key if the root node has no entries. This does not usually happen because b-tree mappings with 0 child nodes are never created by mkfs.nilfs2 or nilfs2 itself. However, it can happen if the b-tree root node read from a device is configured that way, so fix this potential issue by adding a check for that case. • https://git.kernel.org/stable/c/17c76b0104e4a6513983777e1a17e0297a12b0c4 https://git.kernel.org/stable/c/f3a9859767c7aea758976f5523903d247e585129 https://git.kernel.org/stable/c/ed76d381dae125b81d09934e365391a656249da8 https://git.kernel.org/stable/c/d20674f31626e0596ae4c1d9401dfb6739b81b58 https://git.kernel.org/stable/c/c4f8554996e8ada3be872dfb8f60e93bcf15fb27 https://git.kernel.org/stable/c/a8abfda768b9f33630cfbc4af6c4214f1e5681b0 https://git.kernel.org/stable/c/257f9e5185eb6de83377caea686c306e22e871f2 https://git.kernel.org/stable/c/a33e967b681e088a125b979975c93e345 •
CVE-2024-47756 – PCI: keystone: Fix if-statement expression in ks_pcie_quirk()
https://notcve.org/view.php?id=CVE-2024-47756
In the Linux kernel, the following vulnerability has been resolved: PCI: keystone: Fix if-statement expression in ks_pcie_quirk() This code accidentally uses && where || was intended. It potentially results in a NULL dereference. Thus, fix the if-statement expression to use the correct condition. [kwilczynski: commit log] • https://git.kernel.org/stable/c/cfb006e185f64edbbdf7869eac352442bc76b8f6 https://git.kernel.org/stable/c/ebbdbbc580c1695dec283d0ba6448729dc993246 https://git.kernel.org/stable/c/135843c351c08df72bdd4b4ebea53c8052a76881 https://git.kernel.org/stable/c/af218c803fe298ddf00abef331aa526b20d7ea61 https://git.kernel.org/stable/c/576d0fb6f8d4bd4695e70eee173a1b9c7bae9572 https://git.kernel.org/stable/c/dd47051c76c8acd8cb983f01b4d1265da29cb66a https://git.kernel.org/stable/c/86f271f22bbb6391410a07e08d6ca3757fda01fa https://git.kernel.org/stable/c/9c9afc3e75069fcfb067727973242cfbf •
CVE-2024-47754 – media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning
https://notcve.org/view.php?id=CVE-2024-47754
In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning Fix a smatch static checker warning on vdec_h264_req_multi_if.c. Which leads to a kernel crash when fb is NULL. • https://git.kernel.org/stable/c/397edc703a10f670a2692e492a245f6be1fe279a https://git.kernel.org/stable/c/588bcce9e64cc5138858ab562268eb3943c5b06c https://git.kernel.org/stable/c/47b3b97930913ca74a595cc12bdbb650259afc6e https://git.kernel.org/stable/c/301f7778263116388c20521a1a641067647ab31c https://git.kernel.org/stable/c/9be85491619f1953b8a29590ca630be571941ffa •
CVE-2024-47753 – media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning
https://notcve.org/view.php?id=CVE-2024-47753
In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning Fix a smatch static checker warning on vdec_vp8_req_if.c. Which leads to a kernel crash when fb is NULL. • https://git.kernel.org/stable/c/7a7ae26fd458397d04421756dd19e5b8cf29a08f https://git.kernel.org/stable/c/dbe5b7373801c261f3ea118145fbb2caac5f9324 https://git.kernel.org/stable/c/35cc704622b3a9bc02a4755d5ba80238eee3cdc2 https://git.kernel.org/stable/c/3167aa42941b68405a092df114453ef0f1b09c2c https://git.kernel.org/stable/c/b113bc7c0e83b32f4dd2d291a2b6c4803e0a2c44 •