vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-27075): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | 05/01/2024 | 07/01/2024 | 02/20/2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-frontends: avoid stack overflow warnings with clang
A previous patch worked around a KASAN issue in stv0367, now a similar
problem showed up with clang:
drivers/media/dvb-frontends/stv0367.c:1222:12: error: stack frame size (3624) exceeds limit (2048) in 'stv0367ter_set_frontend' [-Werror,-Wframe-larger-than]
1214 | static int stv0367ter_set_frontend(struct dvb_frontend *fe)
Rework the stv0367_writereg() function to be simpler and mark both
register access functions as noinline_for_stack so the temporary
i2c_msg structures do not get duplicated on the stack when KASAN_STACK
is enabled.
Solution(s)
References
- CVE-2024-27075
- https://attackerkb.com/topics/CVE-2024-27075
- UBUNTU-USN-6816-1
- UBUNTU-USN-6817-1
- UBUNTU-USN-6817-2
- UBUNTU-USN-6817-3
- UBUNTU-USN-6820-1
- UBUNTU-USN-6820-2
- UBUNTU-USN-6821-1
- UBUNTU-USN-6821-2
- UBUNTU-USN-6821-3
- UBUNTU-USN-6821-4
- UBUNTU-USN-6828-1
- UBUNTU-USN-6871-1
- UBUNTU-USN-6878-1
- UBUNTU-USN-6892-1
- UBUNTU-USN-6896-1
- UBUNTU-USN-6896-2
- UBUNTU-USN-6896-3
- UBUNTU-USN-6896-4
- UBUNTU-USN-6896-5
- UBUNTU-USN-6919-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.