Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-45008
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-04 Sep, 2024 | 19:54
Updated At-05 Jan, 2026 | 10:52
Rejected At-
▼CVE Numbering Authority (CNA)
Input: MT - limit max slots

In the Linux kernel, the following vulnerability has been resolved: Input: MT - limit max slots syzbot is reporting too large allocation at input_mt_init_slots(), for num_slots is supplied from userspace using ioctl(UI_DEV_CREATE). Since nobody knows possible max slots, this patch chose 1024.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/input/input-mt.c
Default Status
unaffected
Versions
Affected
  • From 38e7afe96c7c0ad900824911c61fdb04078033dc before 2829c80614890624456337e47320289112785f3e (git)
  • From 38e7afe96c7c0ad900824911c61fdb04078033dc before 87f610a1a7fbdb1f2e3d90b54c955bd3b8a0c322 (git)
  • From 38e7afe96c7c0ad900824911c61fdb04078033dc before 05dd9aabd04f9b5eb04dab9bb83d8c3e982d7549 (git)
  • From 38e7afe96c7c0ad900824911c61fdb04078033dc before 95f73d01f547dfc67fda3022c51e377a0454b505 (git)
  • From 38e7afe96c7c0ad900824911c61fdb04078033dc before 94736334b8a25e4fae8daa6934e54a31f099be43 (git)
  • From 38e7afe96c7c0ad900824911c61fdb04078033dc before 8f04edd554d191834e9e1349ef030318ea6b11ba (git)
  • From 38e7afe96c7c0ad900824911c61fdb04078033dc before cd19f1799c32ba7b874474b1b968815ce5364f73 (git)
  • From 38e7afe96c7c0ad900824911c61fdb04078033dc before 99d3bf5f7377d42f8be60a6b9cb60fb0be34dceb (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/input/input-mt.c
Default Status
affected
Versions
Affected
  • 2.6.36
Unaffected
  • From 0 before 2.6.36 (semver)
  • From 4.19.321 through 4.19.* (semver)
  • From 5.4.283 through 5.4.* (semver)
  • From 5.10.225 through 5.10.* (semver)
  • From 5.15.166 through 5.15.* (semver)
  • From 6.1.107 through 6.1.* (semver)
  • From 6.6.48 through 6.6.* (semver)
  • From 6.10.7 through 6.10.* (semver)
  • From 6.11 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/2829c80614890624456337e47320289112785f3e
N/A
https://git.kernel.org/stable/c/87f610a1a7fbdb1f2e3d90b54c955bd3b8a0c322
N/A
https://git.kernel.org/stable/c/05dd9aabd04f9b5eb04dab9bb83d8c3e982d7549
N/A
https://git.kernel.org/stable/c/95f73d01f547dfc67fda3022c51e377a0454b505
N/A
https://git.kernel.org/stable/c/94736334b8a25e4fae8daa6934e54a31f099be43
N/A
https://git.kernel.org/stable/c/8f04edd554d191834e9e1349ef030318ea6b11ba
N/A
https://git.kernel.org/stable/c/cd19f1799c32ba7b874474b1b968815ce5364f73
N/A
https://git.kernel.org/stable/c/99d3bf5f7377d42f8be60a6b9cb60fb0be34dceb
N/A
Hyperlink: https://git.kernel.org/stable/c/2829c80614890624456337e47320289112785f3e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/87f610a1a7fbdb1f2e3d90b54c955bd3b8a0c322
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/05dd9aabd04f9b5eb04dab9bb83d8c3e982d7549
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/95f73d01f547dfc67fda3022c51e377a0454b505
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/94736334b8a25e4fae8daa6934e54a31f099be43
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8f04edd554d191834e9e1349ef030318ea6b11ba
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cd19f1799c32ba7b874474b1b968815ce5364f73
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/99d3bf5f7377d42f8be60a6b9cb60fb0be34dceb
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
N/A
https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html
Resource: N/A
Details not found