Buffer Overflow Affecting kernel-cross-headers package, versions *
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELCROSSHEADERS-8406184
- published 26 Nov 2024
- disclosed 19 Nov 2024
Introduced: 19 Nov 2024
New CVE-2024-50282 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:8
kernel-cross-headers
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-cross-headers
package and not the kernel-cross-headers
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
Avoid a possible buffer overflow if size is larger than 4K.
(cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)
References
- https://access.redhat.com/security/cve/CVE-2024-50282
- https://git.kernel.org/stable/c/17f5f18085acb5e9d8d13d84a4e12bb3aff2bd64
- https://git.kernel.org/stable/c/25d7e84343e1235b667cf5226c3934fdf36f0df6
- https://git.kernel.org/stable/c/2faaee36e6e30f9efc7fa6bcb0bdcbe05c23f51f
- https://git.kernel.org/stable/c/4d75b9468021c73108b4439794d69e892b1d24e3
- https://git.kernel.org/stable/c/673bdb4200c092692f83b5f7ba3df57021d52d29
- https://git.kernel.org/stable/c/7ccd781794d247589104a791caab491e21218fba
- https://git.kernel.org/stable/c/8906728f2fbd6504cb488f4afdd66af28f330a7a
- https://git.kernel.org/stable/c/aaf6160a4b7f9ee3cd91aa5b3251f5dbe2170f42
CVSS Scores
version 3.1