Executive Summary

Informations
Name CVE-2024-44950 First vendor Publication 2024-09-04
Vendor Cve Last vendor Modification 2024-12-14

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

serial: sc16is7xx: fix invalid FIFO access with special register set

When enabling access to the special register set, Receiver time-out and RHR interrupts can happen. In this case, the IRQ handler will try to read from the FIFO thru the RHR register at address 0x00, but address 0x00 is mapped to DLL register, resulting in erroneous FIFO reading.

Call graph example:
sc16is7xx_startup(): entry
sc16is7xx_ms_proc(): entry
sc16is7xx_set_termios(): entry
sc16is7xx_set_baud(): DLH/DLL = $009C --> access special register set
sc16is7xx_port_irq() entry --> IIR is 0x0C
sc16is7xx_handle_rx() entry
sc16is7xx_fifo_read(): --> unable to access FIFO (RHR) because it is
mapped to DLL (LCR=LCR_CONF_MODE_A)
sc16is7xx_set_baud(): exit --> Restore access to general register set

Fix the problem by claiming the efr_lock mutex when accessing the Special register set.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44950

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3671

Sources (Detail)

https://git.kernel.org/stable/c/6a6730812220a9a5ce4003eb347da1ee5abd06b0
https://git.kernel.org/stable/c/7d3b793faaab1305994ce568b59d61927235f57b
https://git.kernel.org/stable/c/cc6a3f35bc9b3a8da1b195420a2e8d9fdadfa831
https://git.kernel.org/stable/c/dc5ead0e8fc5ef53b8553394d4aab60c277976b3
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Date Informations
2025-03-29 03:39:55
  • Multiple Updates
2025-03-28 13:44:27
  • Multiple Updates
2025-03-28 03:18:08
  • Multiple Updates
2025-03-19 03:13:29
  • Multiple Updates
2025-03-18 03:26:25
  • Multiple Updates
2025-03-14 03:13:43
  • Multiple Updates
2025-03-06 14:10:14
  • Multiple Updates
2025-02-22 03:23:47
  • Multiple Updates
2025-01-08 03:04:50
  • Multiple Updates
2025-01-07 03:04:23
  • Multiple Updates
2024-12-25 03:03:01
  • Multiple Updates
2024-12-15 00:20:42
  • Multiple Updates
2024-12-12 00:21:01
  • Multiple Updates
2024-12-09 17:20:35
  • Multiple Updates
2024-11-23 03:02:58
  • Multiple Updates
2024-11-22 03:01:09
  • Multiple Updates
2024-11-20 02:59:29
  • Multiple Updates
2024-11-14 02:59:47
  • Multiple Updates
2024-11-09 02:59:48
  • Multiple Updates
2024-10-26 02:57:10
  • Multiple Updates
2024-10-25 02:59:03
  • Multiple Updates
2024-10-23 02:58:15
  • Multiple Updates
2024-10-09 21:27:55
  • Multiple Updates
2024-09-05 17:27:25
  • Multiple Updates
2024-09-05 00:27:26
  • First insertion