2024-10-09 16:03:27 +00:00
{
"id" : "CVE-2024-47658" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-10-09T14:15:07.603" ,
2024-10-23 18:03:27 +00:00
"lastModified" : "2024-10-23T16:14:46.213" ,
"vulnStatus" : "Analyzed" ,
2024-10-09 16:03:27 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: stm32/cryp - call finalize with bh disabled\n\nThe finalize operation in interrupt mode produce a produces a spinlock\nrecursion warning. The reason is the fact that BH must be disabled\nduring this process."
2024-10-10 14:03:23 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: stm32/cryp - call finalize with bh disabled La operaci\u00f3n finalize en modo de interrupci\u00f3n produce una advertencia de recursi\u00f3n de spinlock. La raz\u00f3n es que BH debe estar deshabilitado durante este proceso."
2024-10-09 16:03:27 +00:00
}
] ,
2024-10-23 18:03:27 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.5 ,
"baseSeverity" : "MEDIUM" ,
2024-10-23 18:03:27 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-10-23 18:03:27 +00:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "6.6.50" ,
"matchCriteriaId" : "FAE86900-6239-4D0C-B6C0-70BF7C6BA610"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.7" ,
"versionEndExcluding" : "6.10.9" ,
"matchCriteriaId" : "F4469C96-A86B-4CC3-B2D5-C21B6B72641B"
}
]
}
]
}
] ,
2024-10-09 16:03:27 +00:00
"references" : [
{
"url" : "https://git.kernel.org/stable/c/56ddb9aa3b324c2d9645b5a7343e46010cf3f6ce" ,
2024-10-23 18:03:27 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-10-09 16:03:27 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/5d734665cd5d93270731e0ff1dd673fec677f447" ,
2024-10-23 18:03:27 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-10-09 16:03:27 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/d93a2f86b0a998aa1f0870c85a2a60a0771ef89a" ,
2024-10-23 18:03:27 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-10-09 16:03:27 +00:00
}
]
}