Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Validate TA binary size Add TA binary size validation to avoid OOB write. (cherry picked from commit c0a04e3570d72aaf090962156ad085e37c62e442)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 11.0 |
| Linux | Linux Kernel | >= 5.19, < 6.1.107 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/50553ea7cbd3344fbf40afb065f6a2d38171c1adPatch
- https://git.kernel.org/stable/c/5ab8793b9a6cc059f503cbe6fe596f80765e0f19Patch
- https://git.kernel.org/stable/c/c99769bceab4ecb6a067b9af11f9db281eea3e2aPatch
- https://git.kernel.org/stable/c/e562415248f402203e7fb6d8c38c1b32fa99220fPatch
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2024-44977?
CVE-2024-44977 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Validate TA binary size Add TA binary size validation to avoid OOB write. (cherry picked from commit c0a04e3570d72aaf...
How severe is CVE-2024-44977?
CVE-2024-44977 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-44977?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Linux Linux Kernel.