2024-09-30 14:03:19 +00:00

29 lines
1.8 KiB
JSON

{
"id": "CVE-2024-46823",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.897",
"lastModified": "2024-09-30T12:45:57.823",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkunit/overflow: Fix UB in overflow_allocation_test\n\nThe 'device_name' array doesn't exist out of the\n'overflow_allocation_test' function scope. However, it is being used as\na driver name when calling 'kunit_driver_create' from\n'kunit_device_register'. It produces the kernel panic with KASAN\nenabled.\n\nSince this variable is used in one place only, remove it and pass the\ndevice name into kunit_device_register directly as an ascii string."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: kunit/overflow: Arreglar UB en overflow_allocation_test La matriz 'device_name' no existe fuera del \u00e1mbito de la funci\u00f3n 'overflow_allocation_test'. Sin embargo, se est\u00e1 utilizando como nombre de controlador al llamar a 'kunit_driver_create' desde 'kunit_device_register'. Produce el p\u00e1nico del kernel con KASAN habilitado. Dado que esta variable se utiliza en un solo lugar, elim\u00ednela y pase el nombre del dispositivo a kunit_device_register directamente como una cadena ascii."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/92e9bac18124682c4b99ede9ee3bcdd68f121e92",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d1207f07decc66546a7fa463d2f335a856c986ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}