2024-05-29 14:04:39 +00:00

24 lines
1.5 KiB
JSON

{
"id": "CVE-2024-36015",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-29T08:15:33.880",
"lastModified": "2024-05-29T13:02:09.280",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nppdev: Add an error check in register_device\n\nIn register_device, the return value of ida_simple_get is unchecked,\nin witch ida_simple_get will use an invalid index value.\n\nTo address this issue, index should be checked after ida_simple_get. When\nthe index value is abnormal, a warning message should be printed, the port\nshould be dropped, and the value should be recorded."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ppdev: agregue una verificaci\u00f3n de errores en Register_device. En Register_device, el valor de retorno de ida_simple_get no est\u00e1 marcado, por lo que ida_simple_get usar\u00e1 un valor de \u00edndice no v\u00e1lido. Para solucionar este problema, se debe verificar el \u00edndice despu\u00e9s de ida_simple_get. Cuando el valor del \u00edndice es anormal, se debe imprimir un mensaje de advertencia, se debe descartar el puerto y se debe registrar el valor."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}