Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2024-47751 First vendor Publication 2024-10-21
Vendor Cve Last vendor Modification 2024-10-23

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()

Within kirin_pcie_parse_port(), the pcie->num_slots is compared to pcie->gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead to an overflow.

Thus, fix condition to pcie->num_slots + 1 >= MAX_PCI_SLOTS and move pcie->num_slots increment below the if-statement to avoid out-of-bounds array access.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[kwilczynski: commit log]

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47751

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3636

Sources (Detail)

https://git.kernel.org/stable/c/6dcc5b49d6607a741a14122bf3105f3ac50d259e
https://git.kernel.org/stable/c/95248d7497bcbfe7deed4805469c6ff6ddd7f9d1
https://git.kernel.org/stable/c/a5f795f9412854df28e66679c5e6b68b0b79c229
https://git.kernel.org/stable/c/aeb0335971806e15ac91e838ca471936c8e7efd5
https://git.kernel.org/stable/c/c500a86693a126c9393e602741e348f80f1b0fc5
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2024-11-23 03:03:56
  • Multiple Updates
2024-11-22 03:02:06
  • Multiple Updates
2024-11-20 03:00:24
  • Multiple Updates
2024-11-14 03:00:41
  • Multiple Updates
2024-11-09 03:00:40
  • Multiple Updates
2024-10-26 00:28:36
  • Multiple Updates
2024-10-25 21:29:30
  • Multiple Updates
2024-10-25 00:28:34
  • Multiple Updates
2024-10-24 21:27:52
  • Multiple Updates
2024-10-24 03:05:03
  • Multiple Updates
2024-10-23 21:27:47
  • Multiple Updates
2024-10-21 21:27:31
  • Multiple Updates
2024-10-21 17:27:34
  • First insertion