First published: Sat Aug 17 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Prevent out of bounds access in performance query extensions Check that the number of perfmons userspace is passing in the copy and reset extensions is not greater than the internal kernel storage where the ids will be copied into. (cherry picked from commit f32b5128d2c440368b5bf3a7a356823e235caabb)
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.8<6.10.4 | |
Linux Kernel | =6.11-rc1 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42264 has been classified as a high-severity vulnerability due to the potential for out of bounds access in the Linux kernel.
To fix CVE-2024-42264, update your Linux kernel to the patched versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1.
CVE-2024-42264 affects the Linux kernel in specific versions, particularly on Debian-based systems.
If CVE-2024-42264 is not addressed, it could potentially allow attackers to exploit the out of bounds access, leading to privilege escalation or denial of service.
CVE-2024-42264 was disclosed with a fix incorporated into the Linux kernel updates released in response to identified vulnerabilities.