-
CVE-2024-27075
- EPSS 0.04%
- Veröffentlicht 01.05.2024 13:15:51
- Zuletzt bearbeitet 21.11.2024 09:03:48
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: avoid stack overflow warnings with clang A previous patch worked around a KASAN issue in stv0367, now a similar problem showed up with clang: drivers/media/dvb-frontends/stv0367.c:1222:12: error: stack frame size (3624) exceeds limit (2048) in 'stv0367ter_set_frontend' [-Werror,-Wframe-larger-than] 1214 | static int stv0367ter_set_frontend(struct dvb_frontend *fe) Rework the stv0367_writereg() function to be simpler and mark both register access functions as noinline_for_stack so the temporary i2c_msg structures do not get duplicated on the stack when KASAN_STACK is enabled.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
c073c8cede5abd3836e83d70d72606d11d0759d4
Version
3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status
affected
Version <
fa8b472952ef46eb632825051078c21ce0cafe55
Version
3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status
affected
Version <
fb07104a02e87c06c39914d13ed67fd8f839ca82
Version
3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status
affected
Version <
d20b64f156de5d10410963fe238d82a4e7e97a2f
Version
3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status
affected
Version <
107052a8cfeff3a97326277192b4f052e4860a8a
Version
3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status
affected
Version <
8fad9c5bb00d3a9508d18bbfe832e33a47377730
Version
3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status
affected
Version <
d6b4895197ab5a47cb81c6852d49320b05052960
Version
3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status
affected
Version <
ed514ecf4f29c80a2f09ae3c877059b401efe893
Version
3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status
affected
Version <
7a4cf27d1f0538f779bf31b8c99eda394e277119
Version
3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status
affected
Version
dc4bc70259daba144f799e40a99413a86c601006
Status
affected
Version
d1d85ae79d5e5592dccba6890658c0999b864ddc
Status
affected
Version
ad91b2e392be4339e09eefd8479675b4232ddfa1
Status
affected
Version
ec1eeaf5b6c12b561d9a90588987e44a2e2f8b1a
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.16
Status
affected
Version <
4.16
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.311
Status
unaffected
Version <=
5.4.*
Version
5.4.273
Status
unaffected
Version <=
5.10.*
Version
5.10.214
Status
unaffected
Version <=
5.15.*
Version
5.15.153
Status
unaffected
Version <=
6.1.*
Version
6.1.83
Status
unaffected
Version <=
6.6.*
Version
6.6.23
Status
unaffected
Version <=
6.7.*
Version
6.7.11
Status
unaffected
Version <=
6.8.*
Version
6.8.2
Status
unaffected
Version <=
*
Version
6.9
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.121 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|