๐Ÿ” CVE Alert

CVE-2024-47751

UNKNOWN 0.0

PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() Within kirin_pcie_parse_port(), the pcie->num_slots is compared to pcie->gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead to an overflow. Thus, fix condition to pcie->num_slots + 1 >= MAX_PCI_SLOTS and move pcie->num_slots increment below the if-statement to avoid out-of-bounds array access. Found by Linux Verification Center (linuxtesting.org) with SVACE. [kwilczynski: commit log]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b22dbbb24571c052364f476381dbac110bdca4d5 < a5f795f9412854df28e66679c5e6b68b0b79c229 b22dbbb24571c052364f476381dbac110bdca4d5 < 95248d7497bcbfe7deed4805469c6ff6ddd7f9d1 b22dbbb24571c052364f476381dbac110bdca4d5 < 6dcc5b49d6607a741a14122bf3105f3ac50d259e b22dbbb24571c052364f476381dbac110bdca4d5 < aeb0335971806e15ac91e838ca471936c8e7efd5 b22dbbb24571c052364f476381dbac110bdca4d5 < c500a86693a126c9393e602741e348f80f1b0fc5
Linux / Linux
5.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a5f795f9412854df28e66679c5e6b68b0b79c229 git.kernel.org: https://git.kernel.org/stable/c/95248d7497bcbfe7deed4805469c6ff6ddd7f9d1 git.kernel.org: https://git.kernel.org/stable/c/6dcc5b49d6607a741a14122bf3105f3ac50d259e git.kernel.org: https://git.kernel.org/stable/c/aeb0335971806e15ac91e838ca471936c8e7efd5 git.kernel.org: https://git.kernel.org/stable/c/c500a86693a126c9393e602741e348f80f1b0fc5 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html