In the Linux kernel, the following vulnerability has been resolved:
net: sched: schmultiq: fix possible OOB write in multiqtune()
q->bands will be assigned to qopt->bands to execute subsequent code logic after kmalloc. So the old q->bands should not be used in kmalloc. Otherwise, an out-of-bounds write will occur.
[
{
"id": "CVE-2024-36978-10d50e3f",
"target": {
"file": "net/sched/sch_multiq.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"116836023247365727830807583073258796829",
"293186181438904796417585315409241229877",
"193681609402722915796820278242998607810",
"268184959904940014411019765210601625268"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@54c2c171c11a798fe887b3ff72922aa9d1411c1e",
"signature_version": "v1"
},
{
"id": "CVE-2024-36978-240dc341",
"target": {
"file": "net/sched/sch_multiq.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"116836023247365727830807583073258796829",
"293186181438904796417585315409241229877",
"193681609402722915796820278242998607810",
"268184959904940014411019765210601625268"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0f208fad86631e005754606c3ec80c0d44a11882",
"signature_version": "v1"
},
{
"id": "CVE-2024-36978-53022f65",
"target": {
"file": "net/sched/sch_multiq.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"116836023247365727830807583073258796829",
"293186181438904796417585315409241229877",
"193681609402722915796820278242998607810",
"268184959904940014411019765210601625268"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@52b1aa07cda6a199cd6754d3798c7759023bc70f",
"signature_version": "v1"
},
{
"id": "CVE-2024-36978-69d460c4",
"target": {
"file": "net/sched/sch_multiq.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"116836023247365727830807583073258796829",
"293186181438904796417585315409241229877",
"193681609402722915796820278242998607810",
"268184959904940014411019765210601625268"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@598572c64287aee0b75bbba4e2881496878860f3",
"signature_version": "v1"
},
{
"id": "CVE-2024-36978-c207175f",
"target": {
"file": "net/sched/sch_multiq.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"116836023247365727830807583073258796829",
"293186181438904796417585315409241229877",
"193681609402722915796820278242998607810",
"268184959904940014411019765210601625268"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d6fb5110e8722bc00748f22caeb650fe4672f129",
"signature_version": "v1"
},
{
"id": "CVE-2024-36978-f047fa58",
"target": {
"file": "net/sched/sch_multiq.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"116836023247365727830807583073258796829",
"293186181438904796417585315409241229877",
"193681609402722915796820278242998607810",
"268184959904940014411019765210601625268"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@affc18fdc694190ca7575b9a86632a73b9fe043d",
"signature_version": "v1"
},
{
"id": "CVE-2024-36978-f0aa5795",
"target": {
"file": "net/sched/sch_multiq.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"116836023247365727830807583073258796829",
"293186181438904796417585315409241229877",
"193681609402722915796820278242998607810",
"268184959904940014411019765210601625268"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5d9d241786f49ae7cbc08e7fc95a115e9d80f3d",
"signature_version": "v1"
}
]