cve/2024/CVE-2024-27401.md
2024-05-28 08:49:17 +00:00

18 lines
916 B
Markdown

### [CVE-2024-27401](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27401)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1da177e4c3f4%3C%2067f34f093c0f%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In the Linux kernel, the following vulnerability has been resolved:firewire: nosy: ensure user_length is taken into account when fetching packet contentsEnsure that packet_buffer_get respects the user_length provided. Ifthe length of the head packet exceeds the user_length, packet_buffer_getwill now return 0 to signify to the user that no data were readand a larger buffer size is required. Helps prevent user space overflows.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ethan42/linux-ieee1394