CVE-2024-47751
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()<br />
<br />
Within kirin_pcie_parse_port(), the pcie->num_slots is compared to<br />
pcie->gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead<br />
to an overflow.<br />
<br />
Thus, fix condition to pcie->num_slots + 1 >= MAX_PCI_SLOTS and move<br />
pcie->num_slots increment below the if-statement to avoid out-of-bounds<br />
array access.<br />
<br />
Found by Linux Verification Center (linuxtesting.org) with SVACE.<br />
<br />
[kwilczynski: commit log]
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.54 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/6dcc5b49d6607a741a14122bf3105f3ac50d259e
- https://git.kernel.org/stable/c/95248d7497bcbfe7deed4805469c6ff6ddd7f9d1
- https://git.kernel.org/stable/c/a5f795f9412854df28e66679c5e6b68b0b79c229
- https://git.kernel.org/stable/c/aeb0335971806e15ac91e838ca471936c8e7efd5
- https://git.kernel.org/stable/c/c500a86693a126c9393e602741e348f80f1b0fc5
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



