CVE-2024-27401

HIGH

Linux kernel - Buffer Overflow

Title source: llm

Description

In the Linux kernel, the following vulnerability has been resolved: firewire: nosy: ensure user_length is taken into account when fetching packet contents Ensure that packet_buffer_get respects the user_length provided. If the length of the head packet exceeds the user_length, packet_buffer_get will now return 0 to signify to the user that no data were read and a larger buffer size is required. Helps prevent user space overflows.

Scores

CVSS v3 7.1
EPSS 0.0001
EPSS Percentile 0.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Classification

Status published

Affected Products (17)

linux/linux_kernel < 4.19.314
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
debian/debian_linux
fedoraproject/fedora
fedoraproject/fedora
linux/Kernel < 4.19.314linux
linux/Kernel < 5.4.276linux
linux/Kernel < 5.10.217linux
linux/Kernel < 5.15.159linux
linux/Kernel < 6.1.91linux
... and 2 more

Timeline

Published May 14, 2024
Tracked Since Feb 18, 2026