2024-09-30 17:00:36 +00:00
{
2024-10-21 13:00:49 +00:00
"data_version" : "4.0" ,
2024-09-30 17:00:36 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2024-47751" ,
2024-10-21 13:00:49 +00:00
"ASSIGNER" : "cve@kernel.org" ,
"STATE" : "PUBLIC"
2024-09-30 17:00:36 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-10-21 13:00:49 +00:00
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()\n\nWithin kirin_pcie_parse_port(), the pcie->num_slots is compared to\npcie->gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead\nto an overflow.\n\nThus, fix condition to pcie->num_slots + 1 >= MAX_PCI_SLOTS and move\npcie->num_slots increment below the if-statement to avoid out-of-bounds\narray access.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[kwilczynski: commit log]"
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Linux" ,
"product" : {
"product_data" : [
{
"product_name" : "Linux" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "b22dbbb24571" ,
"version_value" : "a5f795f94128"
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "5.16" ,
"status" : "affected"
} ,
{
"version" : "0" ,
"lessThan" : "5.16" ,
"status" : "unaffected" ,
2024-11-05 11:00:32 +00:00
"versionType" : "semver"
2024-10-21 13:00:49 +00:00
} ,
{
"version" : "6.1.113" ,
"lessThanOrEqual" : "6.1.*" ,
"status" : "unaffected" ,
2024-11-05 11:00:32 +00:00
"versionType" : "semver"
2024-10-21 13:00:49 +00:00
} ,
{
"version" : "6.6.54" ,
"lessThanOrEqual" : "6.6.*" ,
"status" : "unaffected" ,
2024-11-05 11:00:32 +00:00
"versionType" : "semver"
2024-10-21 13:00:49 +00:00
} ,
{
"version" : "6.10.13" ,
"lessThanOrEqual" : "6.10.*" ,
"status" : "unaffected" ,
2024-11-05 11:00:32 +00:00
"versionType" : "semver"
2024-10-21 13:00:49 +00:00
} ,
{
"version" : "6.11.2" ,
"lessThanOrEqual" : "6.11.*" ,
"status" : "unaffected" ,
2024-11-05 11:00:32 +00:00
"versionType" : "semver"
2024-10-21 13:00:49 +00:00
} ,
{
"version" : "6.12-rc1" ,
"lessThanOrEqual" : "*" ,
"status" : "unaffected" ,
"versionType" : "original_commit_for_fix"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://git.kernel.org/stable/c/a5f795f9412854df28e66679c5e6b68b0b79c229" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/a5f795f9412854df28e66679c5e6b68b0b79c229"
} ,
{
"url" : "https://git.kernel.org/stable/c/95248d7497bcbfe7deed4805469c6ff6ddd7f9d1" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/95248d7497bcbfe7deed4805469c6ff6ddd7f9d1"
} ,
{
"url" : "https://git.kernel.org/stable/c/6dcc5b49d6607a741a14122bf3105f3ac50d259e" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/6dcc5b49d6607a741a14122bf3105f3ac50d259e"
} ,
{
"url" : "https://git.kernel.org/stable/c/aeb0335971806e15ac91e838ca471936c8e7efd5" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/aeb0335971806e15ac91e838ca471936c8e7efd5"
} ,
{
"url" : "https://git.kernel.org/stable/c/c500a86693a126c9393e602741e348f80f1b0fc5" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/c500a86693a126c9393e602741e348f80f1b0fc5"
2024-09-30 17:00:36 +00:00
}
]
2024-10-21 13:00:49 +00:00
} ,
"generator" : {
2024-11-05 11:00:32 +00:00
"engine" : "bippy-9e1c9544281a"
2024-09-30 17:00:36 +00:00
}
}