{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:13:15.847","vulnerabilities":[{"cve":{"id":"CVE-2024-36010","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-05-22T12:15:10.660","lastModified":"2025-09-29T17:59:01.407","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix string truncation warnings in igb_set_fw_version\n\nCommit 1978d3ead82c (\"intel: fix string truncation warnings\")\nfixes '-Wformat-truncation=' warnings in igb_main.c by using kasprintf.\n\ndrivers/net/ethernet/intel/igb/igb_main.c:3092:53: warning：‘%d’ directive output may be truncated writing between 1 and 5 bytes into a region of size between 1 and 13 [-Wformat-truncation=]\n 3092 |                                  \"%d.%d, 0x%08x, %d.%d.%d\",\n      |                                                     ^~\ndrivers/net/ethernet/intel/igb/igb_main.c:3092:34: note：directive argument in the range [0, 65535]\n 3092 |                                  \"%d.%d, 0x%08x, %d.%d.%d\",\n      |                                  ^~~~~~~~~~~~~~~~~~~~~~~~~\ndrivers/net/ethernet/intel/igb/igb_main.c:3092:34: note：directive argument in the range [0, 65535]\ndrivers/net/ethernet/intel/igb/igb_main.c:3090:25: note：‘snprintf’ output between 23 and 43 bytes into a destination of size 32\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.\n\nFix this warning by using a larger space for adapter->fw_version,\nand then fall back and continue to use snprintf."},{"lang":"es","value":"En el kernel de Linux, se resolvió la siguiente vulnerabilidad: igb: corrige advertencias de truncamiento de cadenas en igb_set_fw_version Commit 1978d3ead82c (\"intel: corrige advertencias de truncamiento de cadenas\") corrige las advertencias '-Wformat-truncation=' en igb_main.c usando kasprintf. drivers/net/ethernet/intel/igb/igb_main.c:3092:53: ¿advertencia? La salida de la directiva '%d' puede truncarse escribiendo entre 1 y 5 bytes en una región de tamaño entre 1 y 13 [-Wformat-truncation= ] 3092 | \"%d.%d, 0x%08x, %d.%d.%d\", | ^~ drivers/net/ethernet/intel/igb/igb_main.c:3092:34: nota?argumento directivo en el rango [0, 65535] 3092 | \"%d.%d, 0x%08x, %d.%d.%d\", | ^~~~~~~~~~~~~~~~~~~~~~~~~ drivers/net/ethernet/intel/igb/igb_main.c:3092:34: argumento note?directive en el rango [0, 65535] drivers/net/ethernet/intel/igb/igb_main.c:3090:25: ¿nota? Salida 'snprintf' entre 23 y 43 bytes en un destino de tamaño 32 kasprintf() devuelve un puntero a la memoria asignada dinámicamente que puede ser NULL en caso de error. Corrija esta advertencia usando un espacio más grande para adaptador-&gt;fw_version y luego retroceda y continúe usando snprintf."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.8","matchCriteriaId":"B6EE9877-1A98-4700-B284-E7401B4A11FE"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*","matchCriteriaId":"B9F4EA73-0894-400F-A490-3A397AB7A517"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*","matchCriteriaId":"056BD938-0A27-4569-B391-30578B309EE3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*","matchCriteriaId":"F02056A5-B362-4370-9FF8-6F0BD384D520"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*","matchCriteriaId":"62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/c56d055893cbe97848611855d1c97d0ab171eccc","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/c56d055893cbe97848611855d1c97d0ab171eccc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}