Executive Summary

Informations
Name CVE-2024-56763 First vendor Publication 2025-01-06
Vendor Cve Last vendor Modification 2025-01-09

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

tracing: Prevent bad count for tracing_cpumask_write

If a large count is provided, it will trigger a warning in bitmap_parse_user. Also check zero for it.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56763

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3672

Sources (Detail)

https://git.kernel.org/stable/c/03041e474a6a8f1bfd4b96b164bb3165c48fa1a3
https://git.kernel.org/stable/c/1cca920af19df5dd91254e5ff35e68e911683706
https://git.kernel.org/stable/c/2558d753df0628d4187d8e1fd989339460f4f364
https://git.kernel.org/stable/c/3d15f4c2449558ffe83b4dba30614ef1cd6937c3
https://git.kernel.org/stable/c/98feccbf32cfdde8c722bc4587aaa60ee5ac33f0
https://git.kernel.org/stable/c/f60172b447317cb6c5e74b5601a151866269baf6
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2025-01-09 21:20:30
  • Multiple Updates
2025-01-08 05:20:35
  • Multiple Updates
2025-01-06 21:20:27
  • First insertion