摘要:
In the Linux kernel, the following vulnerability has been resolved:
crypto: iaa - Fix nr_cpus < nr_iaa case
If nr_cpus < nr_iaa, the calculated cpus_per_iaa will be 0, which
causes a divide-by-0 in rebalance_wq_table().
Make sure cpus_per_iaa is 1 in that case, and also in the nr_iaa == 0
case, even though cpus_per_iaa is never used if nr_iaa == 0, for
paranoia.
安全等级: Low
公告ID: KylinSec-SA-2024-2110
发布日期: 2024年5月28日
关联CVE: CVE-2024-26945
In the Linux kernel, the following vulnerability has been resolved:
crypto: iaa - Fix nr_cpus < nr_iaa case
If nr_cpus < nr_iaa, the calculated cpus_per_iaa will be 0, which
causes a divide-by-0 in rebalance_wq_table().
Make sure cpus_per_iaa is 1 in that case, and also in the nr_iaa == 0
case, even though cpus_per_iaa is never used if nr_iaa == 0, for
paranoia.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-26945 | KY3.4-4A | kernel | Unaffected |
CVE-2024-26945 | KY3.4-5 | kernel | Unaffected |
CVE-2024-26945 | KY3.5.1 | kernel | Unaffected |
CVE-2024-26945 | KY3.5.3 | kernel | Unaffected |
CVE-2024-26945 | V6 | kernel | Unaffected |