In the Linux kernel, the following vulnerability has been resolved:
block: prevent division by zero in blkrqstat_sum()
The expression dst->nrsamples + src->nrsamples may have zero value on overflow. It is necessary to add a check to avoid division by zero.
Found by Linux Verification Center (linuxtesting.org) with Svace.
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "116688428565799750220714236639180503447",
"length": 409.0
},
"id": "CVE-2024-35925-0297a3cc",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a55dab4ac956deb23690eedd74e70b892a378e7",
"target": {
"file": "block/blk-stat.c",
"function": "blk_rq_stat_sum"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"173280356995225891742057296914194862125",
"250828466784759041766479959880709722851",
"47178008016316053087193656611816279528",
"139787687022897332802589004439891253939"
]
},
"id": "CVE-2024-35925-36c2a63b",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@98ddf2604ade2d954bf5ec193600d5274a43fd68",
"target": {
"file": "block/blk-stat.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "116688428565799750220714236639180503447",
"length": 409.0
},
"id": "CVE-2024-35925-5c4d0c6f",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@98ddf2604ade2d954bf5ec193600d5274a43fd68",
"target": {
"file": "block/blk-stat.c",
"function": "blk_rq_stat_sum"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "116688428565799750220714236639180503447",
"length": 409.0
},
"id": "CVE-2024-35925-9f4b8891",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@512a01da7134bac8f8b373506011e8aaa3283854",
"target": {
"file": "block/blk-stat.c",
"function": "blk_rq_stat_sum"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"173280356995225891742057296914194862125",
"250828466784759041766479959880709722851",
"47178008016316053087193656611816279528",
"139787687022897332802589004439891253939"
]
},
"id": "CVE-2024-35925-a3add887",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@edd073c78d2bf48c5b8bf435bbc3d61d6e7c6c14",
"target": {
"file": "block/blk-stat.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"173280356995225891742057296914194862125",
"250828466784759041766479959880709722851",
"47178008016316053087193656611816279528",
"139787687022897332802589004439891253939"
]
},
"id": "CVE-2024-35925-c6127e38",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6a55dab4ac956deb23690eedd74e70b892a378e7",
"target": {
"file": "block/blk-stat.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "116688428565799750220714236639180503447",
"length": 409.0
},
"id": "CVE-2024-35925-d24425fc",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@edd073c78d2bf48c5b8bf435bbc3d61d6e7c6c14",
"target": {
"file": "block/blk-stat.c",
"function": "blk_rq_stat_sum"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"173280356995225891742057296914194862125",
"250828466784759041766479959880709722851",
"47178008016316053087193656611816279528",
"139787687022897332802589004439891253939"
]
},
"id": "CVE-2024-35925-e4732531",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@512a01da7134bac8f8b373506011e8aaa3283854",
"target": {
"file": "block/blk-stat.c"
}
}
]