In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Validate TA binary size
Add TA binary size validation to avoid OOB write.
(cherry picked from commit c0a04e3570d72aaf090962156ad085e37c62e442)
References
Configurations
Configuration 1 (hide)
|
History
09 Apr 2026, 17:42
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | |
| First Time |
Debian debian Linux
Debian |
03 Nov 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
10 Oct 2024, 17:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/50553ea7cbd3344fbf40afb065f6a2d38171c1ad - Patch | |
| References | () https://git.kernel.org/stable/c/5ab8793b9a6cc059f503cbe6fe596f80765e0f19 - Patch | |
| References | () https://git.kernel.org/stable/c/c99769bceab4ecb6a067b9af11f9db281eea3e2a - Patch | |
| References | () https://git.kernel.org/stable/c/e562415248f402203e7fb6d8c38c1b32fa99220f - Patch | |
| First Time |
Linux linux Kernel
Linux |
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* |
|
| CWE | CWE-787 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
05 Sep 2024, 12:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
04 Sep 2024, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-09-04 20:15
Updated : 2026-04-09 17:42
NVD link : CVE-2024-44977
Mitre link : CVE-2024-44977
CVE.ORG link : CVE-2024-44977
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write
