CVE-2024-27401
HIGHLinux kernel - Buffer Overflow
Title source: llmDescription
In the Linux kernel, the following vulnerability has been resolved: firewire: nosy: ensure user_length is taken into account when fetching packet contents Ensure that packet_buffer_get respects the user_length provided. If the length of the head packet exceeds the user_length, packet_buffer_get will now return 0 to signify to the user that no data were read and a larger buffer size is required. Helps prevent user space overflows.
References (12)
Scores
CVSS v3
7.1
EPSS
0.0001
EPSS Percentile
0.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Classification
Status
published
Affected Products (17)
linux/linux_kernel
< 4.19.314
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
debian/debian_linux
fedoraproject/fedora
fedoraproject/fedora
linux/Kernel
< 4.19.314linux
linux/Kernel
< 5.4.276linux
linux/Kernel
< 5.10.217linux
linux/Kernel
< 5.15.159linux
linux/Kernel
< 6.1.91linux
... and 2 more
Timeline
Published
May 14, 2024
Tracked Since
Feb 18, 2026