In the Linux kernel, the following vulnerability has been resolved:
platform/x86: toshiba_acpi: Fix array out-of-bounds access
In order to use toshiba_dmi_quirks[] together with the standard DMI
matching functions, it must be terminated by a empty entry.
Since this entry is missing, an array out-of-bounds access occurs
every time the quirk list is processed.
Fix this by adding the terminating empty entry.
References
Configurations
Configuration 1 (hide)
|
History
06 Mar 2025, 12:53
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* |
|
CWE | CWE-129 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | () https://git.kernel.org/stable/c/0d71da43d6b7916d36cf1953d793da80433c50bf - Patch | |
References | () https://git.kernel.org/stable/c/639868f1cb87b683cf830353bbee0c4078202313 - Patch | |
References | () https://git.kernel.org/stable/c/b6e02c6b0377d4339986e07aeb696c632cd392aa - Patch | |
References | () https://git.kernel.org/stable/c/e030aa6c972641cb069086a8c7a0f747653e472a - Patch |
Information
Published : 2024-07-29 15:15
Updated : 2025-03-06 12:53
NVD link : CVE-2024-41028
Mitre link : CVE-2024-41028
CVE.ORG link : CVE-2024-41028
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index