๐Ÿ” CVE Alert

CVE-2024-46745

UNKNOWN 0.0

Input: uinput - reject requests with unreasonable number of slots

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: Input: uinput - reject requests with unreasonable number of slots When exercising uinput interface syzkaller may try setting up device with a really large number of slots, which causes memory allocation failure in input_mt_init_slots(). While this allocation failure is handled properly and request is rejected, it results in syzkaller reports. Additionally, such request may put undue burden on the system which will try to free a lot of memory for a bogus request. Fix it by limiting allowed number of slots to 100. This can easily be extended if we see devices that can track more than 100 contacts.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 18, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
38e7afe96c7c0ad900824911c61fdb04078033dc < 9c6d189f0c1c59ba9a32326ec82a0b367a3cd47b 38e7afe96c7c0ad900824911c61fdb04078033dc < 597ff930296c4c8fc6b6a536884d4f1a7187ec70 38e7afe96c7c0ad900824911c61fdb04078033dc < 51fa08edd80003db700bdaa099385c5900d27f4b 38e7afe96c7c0ad900824911c61fdb04078033dc < 9719687398dea8a6a12a10321a54dd75eec7ab2d 38e7afe96c7c0ad900824911c61fdb04078033dc < 61df76619e270a46fd427fbdeb670ad491c42de2 38e7afe96c7c0ad900824911c61fdb04078033dc < a4858b00a1ec57043697fb935565fe267f161833 38e7afe96c7c0ad900824911c61fdb04078033dc < d76fc0f0b18d49b7e721c9e4975ef4bffde2f3e7 38e7afe96c7c0ad900824911c61fdb04078033dc < 206f533a0a7c683982af473079c4111f4a0f9f5e
Linux / Linux
2.6.36

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/9c6d189f0c1c59ba9a32326ec82a0b367a3cd47b git.kernel.org: https://git.kernel.org/stable/c/597ff930296c4c8fc6b6a536884d4f1a7187ec70 git.kernel.org: https://git.kernel.org/stable/c/51fa08edd80003db700bdaa099385c5900d27f4b git.kernel.org: https://git.kernel.org/stable/c/9719687398dea8a6a12a10321a54dd75eec7ab2d git.kernel.org: https://git.kernel.org/stable/c/61df76619e270a46fd427fbdeb670ad491c42de2 git.kernel.org: https://git.kernel.org/stable/c/a4858b00a1ec57043697fb935565fe267f161833 git.kernel.org: https://git.kernel.org/stable/c/d76fc0f0b18d49b7e721c9e4975ef4bffde2f3e7 git.kernel.org: https://git.kernel.org/stable/c/206f533a0a7c683982af473079c4111f4a0f9f5e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-398330.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html