CVE-2024-26618

In the Linux kernel, the following vulnerability has been resolved: arm64/sme: Always exit sme_alloc() early with existing storage When sme_alloc() is called with existing storage and we are not flushing we will always allocate new storage, both leaking the existing storage and corrupting the state. Fix this by separating the checks for flushing and for existing storage as we do for SVE. Callers that reallocate (eg, due to changing the vector length) should call sme_free() themselves.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 May 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/f6421555dbd7cb3d4d70b69f33f998aaeca1e3b5 -

14 Feb 2025, 16:39

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-770
References () https://git.kernel.org/stable/c/569156e4fa347237f8fa2a7e935d860109c55ac4 - () https://git.kernel.org/stable/c/569156e4fa347237f8fa2a7e935d860109c55ac4 - Mailing List, Patch
References () https://git.kernel.org/stable/c/814af6b4e6000e574e74d92197190edf07cc3680 - () https://git.kernel.org/stable/c/814af6b4e6000e574e74d92197190edf07cc3680 - Mailing List, Patch
References () https://git.kernel.org/stable/c/dc7eb8755797ed41a0d1b5c0c39df3c8f401b3d9 - () https://git.kernel.org/stable/c/dc7eb8755797ed41a0d1b5c0c39df3c8f401b3d9 - Mailing List, Patch

21 Nov 2024, 09:02

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64/sme: salir siempre de sme_alloc() antes de tiempo con el almacenamiento existente. Cuando se llama a sme_alloc() con el almacenamiento existente y no estamos vaciando, siempre asignaremos nuevo almacenamiento, y ambos filtrarán el almacenamiento existente, almacenamiento y corrupción del estado. Solucione este problema separando los controles de descarga y de almacenamiento existente como lo hacemos con SVE. Las personas que llaman que se reasignan (por ejemplo, debido al cambio de la longitud del vector) deben llamar ellos mismos a sme_free().
References () https://git.kernel.org/stable/c/569156e4fa347237f8fa2a7e935d860109c55ac4 - () https://git.kernel.org/stable/c/569156e4fa347237f8fa2a7e935d860109c55ac4 -
References () https://git.kernel.org/stable/c/814af6b4e6000e574e74d92197190edf07cc3680 - () https://git.kernel.org/stable/c/814af6b4e6000e574e74d92197190edf07cc3680 -
References () https://git.kernel.org/stable/c/dc7eb8755797ed41a0d1b5c0c39df3c8f401b3d9 - () https://git.kernel.org/stable/c/dc7eb8755797ed41a0d1b5c0c39df3c8f401b3d9 -

11 Mar 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-11 18:15

Updated : 2025-05-22 13:15


NVD link : CVE-2024-26618

Mitre link : CVE-2024-26618

CVE.ORG link : CVE-2024-26618


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-770

Allocation of Resources Without Limits or Throttling