← Volver a CVEs
CVE-2024-41028
HIGH7.8
Descripcion
In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_acpi: Fix array out-of-bounds access In order to use toshiba_dmi_quirks[] together with the standard DMI matching functions, it must be terminated by a empty entry. Since this entry is missing, an array out-of-bounds access occurs every time the quirk list is processed. Fix this by adding the terminating empty entry.
Detalles CVE
Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado7/29/2024
Ultima modificacion11/3/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
linux:linux_kernel
Debilidades (CWE)
CWE-129
Referencias
https://git.kernel.org/stable/c/0d71da43d6b7916d36cf1953d793da80433c50bf(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/639868f1cb87b683cf830353bbee0c4078202313(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/b6e02c6b0377d4339986e07aeb696c632cd392aa(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/e030aa6c972641cb069086a8c7a0f747653e472a(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/0d71da43d6b7916d36cf1953d793da80433c50bf(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/639868f1cb87b683cf830353bbee0c4078202313(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/b6e02c6b0377d4339986e07aeb696c632cd392aa(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/e030aa6c972641cb069086a8c7a0f747653e472a(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.