CVE-2024-47751

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
21/10/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()<br /> <br /> Within kirin_pcie_parse_port(), the pcie-&gt;num_slots is compared to<br /> pcie-&gt;gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead<br /> to an overflow.<br /> <br /> Thus, fix condition to pcie-&gt;num_slots + 1 &gt;= MAX_PCI_SLOTS and move<br /> pcie-&gt;num_slots increment below the if-statement to avoid out-of-bounds<br /> array access.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.<br /> <br /> [kwilczynski: commit log]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.113 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.54 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.13 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.11 (including) 6.11.2 (excluding)