AbrarKhan / Linux-4.19.72

Other
0 stars 0 forks source link

CVE-2024-27075 (Medium) detected in linuxlinux-4.19.87 #550

Open mend-bolt-for-github[bot] opened 1 month ago

mend-bolt-for-github[bot] commented 1 month ago

CVE-2024-27075 - Medium Severity Vulnerability

Vulnerable Library - linuxlinux-4.19.87

The Linux Kernel

Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux

Found in HEAD commit: 57e05824dcb3cd61bc82b1e93e4409de26d2caba

Found in base branch: master

Vulnerable Source Files (2)

/drivers/media/dvb-frontends/stv0367.c /drivers/media/dvb-frontends/stv0367.c

Vulnerability Details

In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: avoid stack overflow warnings with clang A previous patch worked around a KASAN issue in stv0367, now a similar problem showed up with clang: drivers/media/dvb-frontends/stv0367.c:1222:12: error: stack frame size (3624) exceeds limit (2048) in 'stv0367ter_set_frontend' [-Werror,-Wframe-larger-than] 1214 | static int stv0367ter_set_frontend(struct dvb_frontend *fe) Rework the stv0367_writereg() function to be simpler and mark both register access functions as noinline_for_stack so the temporary i2c_msg structures do not get duplicated on the stack when KASAN_STACK is enabled.

Publish Date: 2024-05-01

URL: CVE-2024-27075

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://lore.kernel.org/linux-cve-announce/2024050134-CVE-2024-27075-5e4f@gregkh/T/#u

Release Date: 2024-05-01

Fix Resolution: v4.19.311,v5.4.273,v5.10.214,v5.15.153,v6.1.83,v6.6.23,v6.7.11,v6.8.2


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 2 weeks ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.