First published: Tue Nov 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a possible buffer overflow if size is larger than 4K. (cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
<4.19.324 | ||
>=4.20<5.4.286 | ||
>=5.5<5.10.230 | ||
>=5.11<5.15.172 | ||
>=5.16<6.1.117 | ||
>=6.2<6.6.61 | ||
>=6.7<6.11.8 | ||
=6.12-rc1 | ||
=6.12-rc2 | ||
=6.12-rc3 | ||
=6.12-rc4 | ||
=6.12-rc5 | ||
=6.12-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50282 has been classified as a potential buffer overflow vulnerability in the Linux kernel.
To fix CVE-2024-50282, update your Linux kernel to a version that includes the necessary patch.
CVE-2024-50282 affects various versions of the Linux kernel, specifically those prior to 4.19.324 and versions between 4.20 and 6.12-rc6.
CVE-2024-50282 is a buffer overflow vulnerability that arises from missing size checks in kernel functions.
There are no specific workarounds recommended for CVE-2024-50282; updating the kernel is the best course of action.