CVE-2024-50282
Published: November 21, 2024Last modified: November 21, 2024
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a possible buffer overflow if size is larger than 4K. (cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Vulnerable (6.1.134-r0) |
Stream | linux-lts | Fixed (6.6.62-r0) |
References
- https://git.kernel.org/stable/c/17f5f18085acb5e9d8d13d84a4e12bb3aff2bd64
- https://git.kernel.org/stable/c/25d7e84343e1235b667cf5226c3934fdf36f0df6
- https://git.kernel.org/stable/c/2faaee36e6e30f9efc7fa6bcb0bdcbe05c23f51f
- https://git.kernel.org/stable/c/4d75b9468021c73108b4439794d69e892b1d24e3
- https://git.kernel.org/stable/c/673bdb4200c092692f83b5f7ba3df57021d52d29
- https://git.kernel.org/stable/c/7ccd781794d247589104a791caab491e21218fba
- https://git.kernel.org/stable/c/8906728f2fbd6504cb488f4afdd66af28f330a7a
- https://git.kernel.org/stable/c/aaf6160a4b7f9ee3cd91aa5b3251f5dbe2170f42