CVE-2024-26915

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit Allows us to detect subsequent IH ring buffer overflows as well.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*

History

08 Apr 2025, 18:56

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2827633c9dab6304ec4cdbf369363219832e605d - () https://git.kernel.org/stable/c/2827633c9dab6304ec4cdbf369363219832e605d - Patch
References () https://git.kernel.org/stable/c/7330256268664ea0a7dd5b07a3fed363093477dd - () https://git.kernel.org/stable/c/7330256268664ea0a7dd5b07a3fed363093477dd - Patch
References () https://git.kernel.org/stable/c/8983397951b4b0bd51bb4b4ba9749424e1ccbb70 - () https://git.kernel.org/stable/c/8983397951b4b0bd51bb4b4ba9749424e1ccbb70 - Patch
References () https://git.kernel.org/stable/c/9a9d00c23d170d4ef5a1b28e6b69f5c85dd12bc1 - () https://git.kernel.org/stable/c/9a9d00c23d170d4ef5a1b28e6b69f5c85dd12bc1 - Patch
References () https://git.kernel.org/stable/c/a28f4d1e0bed85943d309ac243fd1c200f8af9a2 - () https://git.kernel.org/stable/c/a28f4d1e0bed85943d309ac243fd1c200f8af9a2 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-120

21 Nov 2024, 09:03

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2827633c9dab6304ec4cdbf369363219832e605d - () https://git.kernel.org/stable/c/2827633c9dab6304ec4cdbf369363219832e605d -
References () https://git.kernel.org/stable/c/7330256268664ea0a7dd5b07a3fed363093477dd - () https://git.kernel.org/stable/c/7330256268664ea0a7dd5b07a3fed363093477dd -
References () https://git.kernel.org/stable/c/8983397951b4b0bd51bb4b4ba9749424e1ccbb70 - () https://git.kernel.org/stable/c/8983397951b4b0bd51bb4b4ba9749424e1ccbb70 -
References () https://git.kernel.org/stable/c/9a9d00c23d170d4ef5a1b28e6b69f5c85dd12bc1 - () https://git.kernel.org/stable/c/9a9d00c23d170d4ef5a1b28e6b69f5c85dd12bc1 -
References () https://git.kernel.org/stable/c/a28f4d1e0bed85943d309ac243fd1c200f8af9a2 - () https://git.kernel.org/stable/c/a28f4d1e0bed85943d309ac243fd1c200f8af9a2 -

06 Nov 2024, 17:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Restablecer el bit IH OVERFLOW_CLEAR También nos permite detectar desbordamientos posteriores del búfer en anillo IH.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

17 Apr 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 16:15

Updated : 2025-04-08 18:56


NVD link : CVE-2024-26915

Mitre link : CVE-2024-26915

CVE.ORG link : CVE-2024-26915


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')