[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024111943-CVE-2024-50282-1579@gregkh>
Date: Tue, 19 Nov 2024 02:32:37 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2024-50282: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
Avoid a possible buffer overflow if size is larger than 4K.
(cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)
The Linux kernel CVE team has assigned CVE-2024-50282 to this issue.
Affected and fixed versions
===========================
Fixed in 4.19.324 with commit 673bdb4200c0
Fixed in 5.4.286 with commit 7ccd781794d2
Fixed in 5.10.230 with commit 17f5f18085ac
Fixed in 5.15.172 with commit aaf6160a4b7f
Fixed in 6.1.117 with commit 25d7e84343e1
Fixed in 6.6.61 with commit 8906728f2fbd
Fixed in 6.11.8 with commit 2faaee36e6e3
Fixed in 6.12 with commit 4d75b9468021
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2024-50282
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/gpu/drm/amd/amdgpu/amdgpu_debugfs.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/673bdb4200c092692f83b5f7ba3df57021d52d29
https://git.kernel.org/stable/c/7ccd781794d247589104a791caab491e21218fba
https://git.kernel.org/stable/c/17f5f18085acb5e9d8d13d84a4e12bb3aff2bd64
https://git.kernel.org/stable/c/aaf6160a4b7f9ee3cd91aa5b3251f5dbe2170f42
https://git.kernel.org/stable/c/25d7e84343e1235b667cf5226c3934fdf36f0df6
https://git.kernel.org/stable/c/8906728f2fbd6504cb488f4afdd66af28f330a7a
https://git.kernel.org/stable/c/2faaee36e6e30f9efc7fa6bcb0bdcbe05c23f51f
https://git.kernel.org/stable/c/4d75b9468021c73108b4439794d69e892b1d24e3
Powered by blists - more mailing lists