CVE-2024-36477Out-of-bounds Read in Linux

CWE-125Out-of-bounds Read16 documents7 sources
Severity
7.8HIGHNVD
OSV5.5
EPSS
0.0%
top 92.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 21
Latest updateSep 23

Description

In the Linux kernel, the following vulnerability has been resolved: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer The TPM SPI transfer mechanism uses MAX_SPI_FRAMESIZE for computing the maximum transfer length and the size of the transfer buffer. As such, it does not account for the 4 bytes of header that prepends the SPI data frame. This can result in out-of-bounds accesses and was confirmed with KASAN. Introduce SPI_HDRSIZE to account for the header and use to allo

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages13 packages

Patches

🔴Vulnerability Details

7
OSV
linux-hwe-6.82024-09-23
OSV
linux-raspi vulnerabilities2024-09-23
OSV
linux-lowlatency-hwe-6.8 vulnerabilities2024-09-13
OSV
linux-azure vulnerabilities2024-09-12
OSV
linux, linux-aws, linux-gcp, linux-gke, linux-ibm, linux-lowlatency, linux-oem-6.8, linux-oracle vulnerabilities2024-09-11

📋Vendor Advisories

8
Ubuntu
Linux kernel vulnerabilities2024-09-23
Ubuntu
Linux kernel vulnerabilities2024-09-23
Ubuntu
Linux kernel vulnerabilities2024-09-13
Ubuntu
Linux kernel vulnerabilities2024-09-12
Ubuntu
Linux kernel vulnerabilities2024-09-11
CVE-2024-36477 — Out-of-bounds Read in Linux | cvebase