First published: Wed Sep 04 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Validate TA binary size Add TA binary size validation to avoid OOB write. (cherry picked from commit c0a04e3570d72aaf090962156ad085e37c62e442)
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.1.107 | |
Linux Kernel | >6.2<6.6.48 | |
Linux Kernel | >6.7<6.10.7 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
Linux Kernel | =6.11-rc3 | |
Linux Kernel | =6.11-rc4 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.119-1 6.12.11-1 |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44977 has a medium severity level due to its potential for causing out-of-bounds writes in the Linux kernel.
To fix CVE-2024-44977, update to the recommended versions of the Linux kernel, specifically 6.1.123-1 or later.
CVE-2024-44977 affects several versions of the Linux kernel, specifically from versions 6.2 to 6.6.48 and specific release candidates of version 6.11.
Yes, CVE-2024-44977 is associated with the AMD GPU drivers in the Linux kernel, relating to TA binary size validation.
Exploitation of CVE-2024-44977 could lead to potential system crashes or arbitrary code execution due to out-of-bounds memory access.