-

CVE-2024-27075

In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: avoid stack overflow warnings with clang

A previous patch worked around a KASAN issue in stv0367, now a similar
problem showed up with clang:

drivers/media/dvb-frontends/stv0367.c:1222:12: error: stack frame size (3624) exceeds limit (2048) in 'stv0367ter_set_frontend' [-Werror,-Wframe-larger-than]
 1214 | static int stv0367ter_set_frontend(struct dvb_frontend *fe)

Rework the stv0367_writereg() function to be simpler and mark both
register access functions as noinline_for_stack so the temporary
i2c_msg structures do not get duplicated on the stack when KASAN_STACK
is enabled.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < c073c8cede5abd3836e83d70d72606d11d0759d4
Version 3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status affected
Version < fa8b472952ef46eb632825051078c21ce0cafe55
Version 3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status affected
Version < fb07104a02e87c06c39914d13ed67fd8f839ca82
Version 3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status affected
Version < d20b64f156de5d10410963fe238d82a4e7e97a2f
Version 3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status affected
Version < 107052a8cfeff3a97326277192b4f052e4860a8a
Version 3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status affected
Version < 8fad9c5bb00d3a9508d18bbfe832e33a47377730
Version 3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status affected
Version < d6b4895197ab5a47cb81c6852d49320b05052960
Version 3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status affected
Version < ed514ecf4f29c80a2f09ae3c877059b401efe893
Version 3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status affected
Version < 7a4cf27d1f0538f779bf31b8c99eda394e277119
Version 3cd890dbe2a4f14cc44c85bb6cf37e5e22d4dd0e
Status affected
Version dc4bc70259daba144f799e40a99413a86c601006
Status affected
Version d1d85ae79d5e5592dccba6890658c0999b864ddc
Status affected
Version ad91b2e392be4339e09eefd8479675b4232ddfa1
Status affected
Version ec1eeaf5b6c12b561d9a90588987e44a2e2f8b1a
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.16
Status affected
Version < 4.16
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.311
Status unaffected
Version <= 5.4.*
Version 5.4.273
Status unaffected
Version <= 5.10.*
Version 5.10.214
Status unaffected
Version <= 5.15.*
Version 5.15.153
Status unaffected
Version <= 6.1.*
Version 6.1.83
Status unaffected
Version <= 6.6.*
Version 6.6.23
Status unaffected
Version <= 6.7.*
Version 6.7.11
Status unaffected
Version <= 6.8.*
Version 6.8.2
Status unaffected
Version <= *
Version 6.9
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.121
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string