In the Linux kernel, the following vulnerability has been resolved:
block: fix overflow in blk_ioctl_discard()
There is no check for overflow of 'start + len' in blk_ioctl_discard().
Hung task occurs if submit an discard ioctl with the following param:
start = 0x80000000000ff000, len = 0x8000000000fff000;
Add the overflow validation now.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-05-30 16:15
Updated : 2025-09-17 22:16
NVD link : CVE-2024-36917
Mitre link : CVE-2024-36917
CVE.ORG link : CVE-2024-36917
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-190
Integer Overflow or Wraparound
