In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Validate TA binary size
Add TA binary size validation to avoid OOB write.
(cherry picked from commit c0a04e3570d72aaf090962156ad085e37c62e442)
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    03 Nov 2025, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
10 Oct 2024, 17:47
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Linux linux Kernel
         Linux  | 
|
| CWE | CWE-787 | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 7.8  | 
| References | () https://git.kernel.org/stable/c/50553ea7cbd3344fbf40afb065f6a2d38171c1ad - Patch | |
| References | () https://git.kernel.org/stable/c/5ab8793b9a6cc059f503cbe6fe596f80765e0f19 - Patch | |
| References | () https://git.kernel.org/stable/c/c99769bceab4ecb6a067b9af11f9db281eea3e2a - Patch | |
| References | () https://git.kernel.org/stable/c/e562415248f402203e7fb6d8c38c1b32fa99220f - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*  | 
05 Sep 2024, 12:53
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
04 Sep 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-09-04 20:15
Updated : 2025-11-03 23:15
NVD link : CVE-2024-44977
Mitre link : CVE-2024-44977
CVE.ORG link : CVE-2024-44977
JSON object : View
Products Affected
                linux
- linux_kernel
 
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
