← Back to CVEs
CVE-2024-41028
HIGH7.8
Description
In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_acpi: Fix array out-of-bounds access In order to use toshiba_dmi_quirks[] together with the standard DMI matching functions, it must be terminated by a empty entry. Since this entry is missing, an array out-of-bounds access occurs every time the quirk list is processed. Fix this by adding the terminating empty entry.
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published7/29/2024
Last Modified11/3/2025
Sourcenvd
Honeypot Sightings0
Affected Products
linux:linux_kernel
Weaknesses (CWE)
CWE-129
References
https://git.kernel.org/stable/c/0d71da43d6b7916d36cf1953d793da80433c50bf(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/639868f1cb87b683cf830353bbee0c4078202313(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/b6e02c6b0377d4339986e07aeb696c632cd392aa(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/e030aa6c972641cb069086a8c7a0f747653e472a(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/0d71da43d6b7916d36cf1953d793da80433c50bf(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/639868f1cb87b683cf830353bbee0c4078202313(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/b6e02c6b0377d4339986e07aeb696c632cd392aa(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/stable/c/e030aa6c972641cb069086a8c7a0f747653e472a(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.