Bug 1223081 (CVE-2024-26824)

Summary: VUL-0: CVE-2024-26824: kernel: crypto: algif_hash: invalid free when a zero-length message is hashed by algif_hash
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: thomas.leroy, vasant.karasulli
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/402312/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-26824:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-04-18 12:59:12 UTC
In the Linux kernel, the following vulnerability has been resolved:

crypto: algif_hash - Remove bogus SGL free on zero-length error path

When a zero-length message is hashed by algif_hash, and an error
is triggered, it tries to free an SG list that was never allocated
in the first place.  Fix this by not freeing the SG list on the
zero-length error path.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-26824
https://www.cve.org/CVERecord?id=CVE-2024-26824
https://git.kernel.org/stable/c/24c890dd712f6345e382256cae8c97abb0406b70
https://git.kernel.org/stable/c/775f3c1882a493168e08fdb8cde0865c8f3a8a29
https://git.kernel.org/stable/c/9c82920359b7c1eddaf72069bcfe0ffddf088cd0
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-26824.mbox
https://bugzilla.redhat.com/show_bug.cgi?id=2275609
Comment 11 Gabriele Sonnu 2024-06-10 12:54:58 UTC
All done, closing.