2024-11-25 23:03:48 +00:00
{
"id" : "CVE-2024-53098" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-11-25T22:15:16.147" ,
2024-12-24 17:03:42 +00:00
"lastModified" : "2024-12-24T15:48:21.330" ,
"vulnStatus" : "Analyzed" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2024-11-25 23:03:48 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/ufence: Prefetch ufence addr to catch bogus address\n\naccess_ok() only checks for addr overflow so also try to read the addr\nto catch invalid addr sent from userspace.\n\n(cherry picked from commit 9408c4508483ffc60811e910a93d6425b8e63928)"
2024-12-08 03:06:42 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe/ufence: Prefetch ufence addr para capturar direcciones falsas. access_ok() solo verifica el desbordamiento de direcciones, por lo que tambi\u00e9n intenta leer la direcci\u00f3n para capturar direcciones no v\u00e1lidas enviadas desde el espacio de usuario. (seleccionado de el commit 9408c4508483ffc60811e910a93d6425b8e63928)"
2024-11-25 23:03:48 +00:00
}
] ,
2024-12-24 17:03:42 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.11.9" ,
"matchCriteriaId" : "5163F80F-8D8E-4FFD-B327-624A8CAF902D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F361E1D-580F-4A2D-A509-7615F73167A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*" ,
"matchCriteriaId" : "E0F717D8-3014-4F84-8086-0124B2111379"
}
]
}
]
}
] ,
2024-11-25 23:03:48 +00:00
"references" : [
{
"url" : "https://git.kernel.org/stable/c/5d623ffbae96b23f1fc43a3d5a267aabdb07583d" ,
2024-12-24 17:03:42 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-11-25 23:03:48 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/9c1813b3253480b30604c680026c7dc721ce86d1" ,
2024-12-24 17:03:42 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-11-25 23:03:48 +00:00
}
]
}