CVE-2024-27401
Vulnerability from cvelistv5
Published
2024-05-13 10:29
Modified
2024-12-19 08:54
Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
firewire: nosy: ensure user_length is taken into account when fetching packet contents
Ensure that packet_buffer_get respects the user_length provided. If
the length of the head packet exceeds the user_length, packet_buffer_get
will now return 0 to signify to the user that no data were read
and a larger buffer size is required. Helps prevent user space overflows.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Linux | Linux |
Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Version: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 |
||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-27401", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-05-13T17:55:43.034157Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-07-05T17:21:00.939Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T00:34:52.126Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://git.kernel.org/stable/c/67f34f093c0f7bf33f5b4ae64d3d695a3b978285", }, { tags: [ "x_transferred", ], url: "https://git.kernel.org/stable/c/7b8c7bd2296e95b38a6ff346242356a2e7190239", }, { tags: [ "x_transferred", ], url: "https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb", }, { tags: [ "x_transferred", ], url: "https://git.kernel.org/stable/c/79f988d3ffc1aa778fc5181bdfab312e57956c6b", }, { tags: [ "x_transferred", ], url: "https://git.kernel.org/stable/c/4ee0941da10e8fdcdb34756b877efd3282594c1f", }, { tags: [ "x_transferred", ], url: "https://git.kernel.org/stable/c/1fe60ee709436550f8cfbab01295936b868d5baa", }, { tags: [ "x_transferred", ], url: "https://git.kernel.org/stable/c/539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c", }, { tags: [ "x_transferred", ], url: "https://git.kernel.org/stable/c/38762a0763c10c24a4915feee722d7aa6e73eb98", }, { tags: [ "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/", }, { tags: [ "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/", }, { tags: [ "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", }, { tags: [ "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Linux", programFiles: [ "drivers/firewire/nosy.c", ], repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", vendor: "Linux", versions: [ { lessThan: "67f34f093c0f7bf33f5b4ae64d3d695a3b978285", status: "affected", version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", versionType: "git", }, { lessThan: "7b8c7bd2296e95b38a6ff346242356a2e7190239", status: "affected", version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", versionType: "git", }, { lessThan: "cca330c59c54207567a648357835f59df9a286bb", status: "affected", version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", versionType: "git", }, { lessThan: "79f988d3ffc1aa778fc5181bdfab312e57956c6b", status: "affected", version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", versionType: "git", }, { lessThan: "4ee0941da10e8fdcdb34756b877efd3282594c1f", status: "affected", version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", versionType: "git", }, { lessThan: "1fe60ee709436550f8cfbab01295936b868d5baa", status: "affected", version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", versionType: "git", }, { lessThan: "539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c", status: "affected", version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", versionType: "git", }, { lessThan: "38762a0763c10c24a4915feee722d7aa6e73eb98", status: "affected", version: "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2", versionType: "git", }, ], }, { defaultStatus: "affected", product: "Linux", programFiles: [ "drivers/firewire/nosy.c", ], repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", vendor: "Linux", versions: [ { lessThanOrEqual: "4.19.*", status: "unaffected", version: "4.19.314", versionType: "semver", }, { lessThanOrEqual: "5.4.*", status: "unaffected", version: "5.4.276", versionType: "semver", }, { lessThanOrEqual: "5.10.*", status: "unaffected", version: "5.10.217", versionType: "semver", }, { lessThanOrEqual: "5.15.*", status: "unaffected", version: "5.15.159", versionType: "semver", }, { lessThanOrEqual: "6.1.*", status: "unaffected", version: "6.1.91", versionType: "semver", }, { lessThanOrEqual: "6.6.*", status: "unaffected", version: "6.6.31", versionType: "semver", }, { lessThanOrEqual: "6.8.*", status: "unaffected", version: "6.8.10", versionType: "semver", }, { lessThanOrEqual: "*", status: "unaffected", version: "6.9", versionType: "original_commit_for_fix", }, ], }, ], descriptions: [ { lang: "en", value: "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: nosy: ensure user_length is taken into account when fetching packet contents\n\nEnsure that packet_buffer_get respects the user_length provided. If\nthe length of the head packet exceeds the user_length, packet_buffer_get\nwill now return 0 to signify to the user that no data were read\nand a larger buffer size is required. Helps prevent user space overflows.", }, ], providerMetadata: { dateUpdated: "2024-12-19T08:54:19.179Z", orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", shortName: "Linux", }, references: [ { url: "https://git.kernel.org/stable/c/67f34f093c0f7bf33f5b4ae64d3d695a3b978285", }, { url: "https://git.kernel.org/stable/c/7b8c7bd2296e95b38a6ff346242356a2e7190239", }, { url: "https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb", }, { url: "https://git.kernel.org/stable/c/79f988d3ffc1aa778fc5181bdfab312e57956c6b", }, { url: "https://git.kernel.org/stable/c/4ee0941da10e8fdcdb34756b877efd3282594c1f", }, { url: "https://git.kernel.org/stable/c/1fe60ee709436550f8cfbab01295936b868d5baa", }, { url: "https://git.kernel.org/stable/c/539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c", }, { url: "https://git.kernel.org/stable/c/38762a0763c10c24a4915feee722d7aa6e73eb98", }, ], title: "firewire: nosy: ensure user_length is taken into account when fetching packet contents", x_generator: { engine: "bippy-5f407fcff5a0", }, }, }, cveMetadata: { assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", assignerShortName: "Linux", cveId: "CVE-2024-27401", datePublished: "2024-05-13T10:29:53.862Z", dateReserved: "2024-02-25T13:47:42.681Z", dateUpdated: "2024-12-19T08:54:19.179Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { descriptions: "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfirewire: nosy: ensure user_length is taken into account when fetching packet contents\\n\\nEnsure that packet_buffer_get respects the user_length provided. If\\nthe length of the head packet exceeds the user_length, packet_buffer_get\\nwill now return 0 to signify to the user that no data were read\\nand a larger buffer size is required. Helps prevent user space overflows.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firewire: nosy: aseg\\u00farese de que se tenga en cuenta la longitud de usuario al recuperar el contenido del paquete. Aseg\\u00farese de que paquete_buffer_get respete la longitud de usuario proporcionada. Si la longitud del paquete principal excede la longitud del usuario, paquete_buffer_get ahora devolver\\u00e1 0 para indicarle al usuario que no se leyeron datos y que se requiere un tama\\u00f1o de b\\u00fafer mayor. Ayuda a evitar el desbordamiento del espacio del usuario.\"}]", id: "CVE-2024-27401", lastModified: "2024-11-21T09:04:32.393", published: "2024-05-14T15:12:29.623", references: "[{\"url\": \"https://git.kernel.org/stable/c/1fe60ee709436550f8cfbab01295936b868d5baa\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/38762a0763c10c24a4915feee722d7aa6e73eb98\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/4ee0941da10e8fdcdb34756b877efd3282594c1f\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/67f34f093c0f7bf33f5b4ae64d3d695a3b978285\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/79f988d3ffc1aa778fc5181bdfab312e57956c6b\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/7b8c7bd2296e95b38a6ff346242356a2e7190239\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/1fe60ee709436550f8cfbab01295936b868d5baa\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/38762a0763c10c24a4915feee722d7aa6e73eb98\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/4ee0941da10e8fdcdb34756b877efd3282594c1f\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/67f34f093c0f7bf33f5b4ae64d3d695a3b978285\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/79f988d3ffc1aa778fc5181bdfab312e57956c6b\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/7b8c7bd2296e95b38a6ff346242356a2e7190239\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", sourceIdentifier: "416baaa9-dc9f-4396-8d5f-8c081fb06d67", vulnStatus: "Awaiting Analysis", }, nvd: "{\"cve\":{\"id\":\"CVE-2024-27401\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-14T15:12:29.623\",\"lastModified\":\"2024-11-21T09:04:32.393\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfirewire: nosy: ensure user_length is taken into account when fetching packet contents\\n\\nEnsure that packet_buffer_get respects the user_length provided. If\\nthe length of the head packet exceeds the user_length, packet_buffer_get\\nwill now return 0 to signify to the user that no data were read\\nand a larger buffer size is required. Helps prevent user space overflows.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firewire: nosy: asegúrese de que se tenga en cuenta la longitud de usuario al recuperar el contenido del paquete. Asegúrese de que paquete_buffer_get respete la longitud de usuario proporcionada. Si la longitud del paquete principal excede la longitud del usuario, paquete_buffer_get ahora devolverá 0 para indicarle al usuario que no se leyeron datos y que se requiere un tamaño de búfer mayor. Ayuda a evitar el desbordamiento del espacio del usuario.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1fe60ee709436550f8cfbab01295936b868d5baa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/38762a0763c10c24a4915feee722d7aa6e73eb98\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4ee0941da10e8fdcdb34756b877efd3282594c1f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/67f34f093c0f7bf33f5b4ae64d3d695a3b978285\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/79f988d3ffc1aa778fc5181bdfab312e57956c6b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7b8c7bd2296e95b38a6ff346242356a2e7190239\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/1fe60ee709436550f8cfbab01295936b868d5baa\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/38762a0763c10c24a4915feee722d7aa6e73eb98\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/4ee0941da10e8fdcdb34756b877efd3282594c1f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/67f34f093c0f7bf33f5b4ae64d3d695a3b978285\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/79f988d3ffc1aa778fc5181bdfab312e57956c6b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/7b8c7bd2296e95b38a6ff346242356a2e7190239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.