{"id":"CVE-2024-27413","summary":"efi/capsule-loader: fix incorrect allocation size","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nefi/capsule-loader: fix incorrect allocation size\n\ngcc-14 notices that the allocation with sizeof(void) on 32-bit architectures\nis not enough for a 64-bit phys_addr_t:\n\ndrivers/firmware/efi/capsule-loader.c: In function 'efi_capsule_open':\ndrivers/firmware/efi/capsule-loader.c:295:24: error: allocation of insufficient size '4' for type 'phys_addr_t' {aka 'long long unsigned int'} with size '8' [-Werror=alloc-size]\n  295 |         cap_info-\u003ephys = kzalloc(sizeof(void *), GFP_KERNEL);\n      |                        ^\n\nUse the correct type instead here.","modified":"2026-04-02T10:07:57.835698Z","published":"2024-05-17T11:50:53.780Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2183-1","SUSE-SU-2024:2185-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20249-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27413.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/00cf21ac526011a29fc708f8912da446fac19f7b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/11aabd7487857b8e7d768fefb092f66dfde68492"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4b73473c050a612fb4317831371073eda07c3050"},{"type":"WEB","url":"https://git.kernel.org/stable/c/537e3f49dbe88881a6f0752beaa596942d9efd64"},{"type":"WEB","url":"https://git.kernel.org/stable/c/62a5dcd9bd3097e9813de62fa6f22815e84a0172"},{"type":"WEB","url":"https://git.kernel.org/stable/c/950d4d74d311a18baed6878dbfba8180d7e5dddd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ddc547dd05a46720866c32022300f7376c40119f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fccfa646ef3628097d59f7d9c1a3e84d4b6bb45e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27413.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27413"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f24c4d478013d82bd1b943df566fff3561d52864"},{"fixed":"00cf21ac526011a29fc708f8912da446fac19f7b"},{"fixed":"950d4d74d311a18baed6878dbfba8180d7e5dddd"},{"fixed":"537e3f49dbe88881a6f0752beaa596942d9efd64"},{"fixed":"4b73473c050a612fb4317831371073eda07c3050"},{"fixed":"ddc547dd05a46720866c32022300f7376c40119f"},{"fixed":"11aabd7487857b8e7d768fefb092f66dfde68492"},{"fixed":"62a5dcd9bd3097e9813de62fa6f22815e84a0172"},{"fixed":"fccfa646ef3628097d59f7d9c1a3e84d4b6bb45e"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"95a362c9a6892085f714eb6e31eea6a0e3aa93bf"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27413.json"}}],"schema_version":"1.7.5"}