U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-27075 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: avoid stack overflow warnings with clang A previous patch worked around a KASAN issue in stv0367, now a similar problem showed up with clang: drivers/media/dvb-frontends/stv0367.c:1222:12: error: stack frame size (3624) exceeds limit (2048) in 'stv0367ter_set_frontend' [-Werror,-Wframe-larger-than] 1214 | static int stv0367ter_set_frontend(struct dvb_frontend *fe) Rework the stv0367_writereg() function to be simpler and mark both register access functions as noinline_for_stack so the temporary i2c_msg structures do not get duplicated on the stack when KASAN_STACK is enabled.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/107052a8cfeff3a97326277192b4f052e4860a8a
https://git.kernel.org/stable/c/7a4cf27d1f0538f779bf31b8c99eda394e277119
https://git.kernel.org/stable/c/8fad9c5bb00d3a9508d18bbfe832e33a47377730
https://git.kernel.org/stable/c/c073c8cede5abd3836e83d70d72606d11d0759d4
https://git.kernel.org/stable/c/d20b64f156de5d10410963fe238d82a4e7e97a2f
https://git.kernel.org/stable/c/d6b4895197ab5a47cb81c6852d49320b05052960
https://git.kernel.org/stable/c/ed514ecf4f29c80a2f09ae3c877059b401efe893
https://git.kernel.org/stable/c/fa8b472952ef46eb632825051078c21ce0cafe55
https://git.kernel.org/stable/c/fb07104a02e87c06c39914d13ed67fd8f839ca82

Weakness Enumeration

CWE-ID CWE Name Source

Change History

6 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-27075
NVD Published Date:
05/01/2024
NVD Last Modified:
11/05/2024
Source:
kernel.org