In the Linux kernel, the following vulnerability has been resolved:
firewire: nosy: ensure user_length is taken into account when fetching packet contents
Ensure that packet_buffer_get respects the user_length provided. If
the length of the head packet exceeds the user_length, packet_buffer_get
will now return 0 to signify to the user that no data were read
and a larger buffer size is required. Helps prevent user space overflows.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2024-05-14 15:12
Updated : 2026-01-22 20:39
NVD link : CVE-2024-27401
Mitre link : CVE-2024-27401
CVE.ORG link : CVE-2024-27401
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
linux
- linux_kernel
CWE
