Bug 2320230 (CVE-2024-47751) - CVE-2024-47751 kernel: PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()
Summary: CVE-2024-47751 kernel: PCI: kirin: Fix buffer overflow in kirin_pcie_parse_po...
Keywords:
Status: NEW
Alias: CVE-2024-47751
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2320392
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-10-21 13:04 UTC by OSIDB Bzimport
Modified: 2024-10-21 20:45 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-10-21 13:04:00 UTC
In the Linux kernel, the following vulnerability has been resolved:

PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()

Within kirin_pcie_parse_port(), the pcie->num_slots is compared to
pcie->gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead
to an overflow.

Thus, fix condition to pcie->num_slots + 1 >= MAX_PCI_SLOTS and move
pcie->num_slots increment below the if-statement to avoid out-of-bounds
array access.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[kwilczynski: commit log]


Note You need to log in before you can comment on or make changes to this bug.