CVE-2024-41028

In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_acpi: Fix array out-of-bounds access In order to use toshiba_dmi_quirks[] together with the standard DMI matching functions, it must be terminated by a empty entry. Since this entry is missing, an array out-of-bounds access occurs every time the quirk list is processed. Fix this by adding the terminating empty entry.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:*

History

06 Mar 2025, 12:53

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
CWE CWE-129
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/0d71da43d6b7916d36cf1953d793da80433c50bf - () https://git.kernel.org/stable/c/0d71da43d6b7916d36cf1953d793da80433c50bf - Patch
References () https://git.kernel.org/stable/c/639868f1cb87b683cf830353bbee0c4078202313 - () https://git.kernel.org/stable/c/639868f1cb87b683cf830353bbee0c4078202313 - Patch
References () https://git.kernel.org/stable/c/b6e02c6b0377d4339986e07aeb696c632cd392aa - () https://git.kernel.org/stable/c/b6e02c6b0377d4339986e07aeb696c632cd392aa - Patch
References () https://git.kernel.org/stable/c/e030aa6c972641cb069086a8c7a0f747653e472a - () https://git.kernel.org/stable/c/e030aa6c972641cb069086a8c7a0f747653e472a - Patch

21 Nov 2024, 09:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: plataforma/x86: toshiba_acpi: corrige el acceso fuera de los límites de la matriz. Para utilizar toshiba_dmi_quirks[] junto con las funciones estándar de coincidencia DMI, debe terminar con una entrada vacía. Dado que falta esta entrada, se produce un acceso fuera de los límites a la matriz cada vez que se procesa la lista de peculiaridades. Solucione este problema agregando la entrada vacía final.
References () https://git.kernel.org/stable/c/0d71da43d6b7916d36cf1953d793da80433c50bf - () https://git.kernel.org/stable/c/0d71da43d6b7916d36cf1953d793da80433c50bf -
References () https://git.kernel.org/stable/c/639868f1cb87b683cf830353bbee0c4078202313 - () https://git.kernel.org/stable/c/639868f1cb87b683cf830353bbee0c4078202313 -
References () https://git.kernel.org/stable/c/b6e02c6b0377d4339986e07aeb696c632cd392aa - () https://git.kernel.org/stable/c/b6e02c6b0377d4339986e07aeb696c632cd392aa -
References () https://git.kernel.org/stable/c/e030aa6c972641cb069086a8c7a0f747653e472a - () https://git.kernel.org/stable/c/e030aa6c972641cb069086a8c7a0f747653e472a -

29 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 15:15

Updated : 2025-03-06 12:53


NVD link : CVE-2024-41028

Mitre link : CVE-2024-41028

CVE.ORG link : CVE-2024-41028


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index