CVE-2024-36917

In the Linux kernel, the following vulnerability has been resolved: block: fix overflow in blk_ioctl_discard() There is no check for overflow of 'start + len' in blk_ioctl_discard(). Hung task occurs if submit an discard ioctl with the following param: start = 0x80000000000ff000, len = 0x8000000000fff000; Add the overflow validation now.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

History

17 Sep 2025, 22:16

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-190
References () https://git.kernel.org/stable/c/22d24a544b0d49bbcbd61c8c0eaf77d3c9297155 - () https://git.kernel.org/stable/c/22d24a544b0d49bbcbd61c8c0eaf77d3c9297155 - Patch
References () https://git.kernel.org/stable/c/507d526a98c355e6f3fb2c47aacad44a69784bee - () https://git.kernel.org/stable/c/507d526a98c355e6f3fb2c47aacad44a69784bee - Patch
References () https://git.kernel.org/stable/c/8a26198186e97ee5fc4b42fde82629cff8c75cd6 - () https://git.kernel.org/stable/c/8a26198186e97ee5fc4b42fde82629cff8c75cd6 - Patch
References () https://git.kernel.org/stable/c/e1d38cde2b7b0fbd1c48082e7a98c37d750af59b - () https://git.kernel.org/stable/c/e1d38cde2b7b0fbd1c48082e7a98c37d750af59b - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

27 Dec 2024, 13:15

Type Values Removed Values Added
References
  • {'url': 'https://git.kernel.org/stable/c/0842ddd83939eb4db940b9af7d39e79722bc41aa', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/6c9915fa9410cbb9bd75ee283c03120046c56d3d', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

21 Nov 2024, 09:22

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/22d24a544b0d49bbcbd61c8c0eaf77d3c9297155 - () https://git.kernel.org/stable/c/22d24a544b0d49bbcbd61c8c0eaf77d3c9297155 -
References () https://git.kernel.org/stable/c/507d526a98c355e6f3fb2c47aacad44a69784bee - () https://git.kernel.org/stable/c/507d526a98c355e6f3fb2c47aacad44a69784bee -
References () https://git.kernel.org/stable/c/8a26198186e97ee5fc4b42fde82629cff8c75cd6 - () https://git.kernel.org/stable/c/8a26198186e97ee5fc4b42fde82629cff8c75cd6 -
References () https://git.kernel.org/stable/c/e1d38cde2b7b0fbd1c48082e7a98c37d750af59b - () https://git.kernel.org/stable/c/e1d38cde2b7b0fbd1c48082e7a98c37d750af59b -

10 Oct 2024, 12:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/0842ddd83939eb4db940b9af7d39e79722bc41aa -
  • () https://git.kernel.org/stable/c/6c9915fa9410cbb9bd75ee283c03120046c56d3d -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bloque: corrige el desbordamiento en blk_ioctl_discard() No hay verificación de desbordamiento de 'start + len' en blk_ioctl_discard(). La tarea bloqueada ocurre si envía un ioctl de descarte con el siguiente parámetro: start = 0x80000000000ff000, len = 0x8000000000fff000; Agregue la validación de desbordamiento ahora.

30 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-30 16:15

Updated : 2025-09-17 22:16


NVD link : CVE-2024-36917

Mitre link : CVE-2024-36917

CVE.ORG link : CVE-2024-36917


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound