Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a possible buffer overflow if size is larger than 4K. (cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 4.19.324 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/2faaee36e6e30f9efc7fa6bcb0bdcbe05c23f51fPatch
- https://git.kernel.org/stable/c/4d75b9468021c73108b4439794d69e892b1d24e3Patch
- https://git.kernel.org/stable/c/673bdb4200c092692f83b5f7ba3df57021d52d29Patch
- https://git.kernel.org/stable/c/8906728f2fbd6504cb488f4afdd66af28f330a7aPatch
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
FAQ
What is CVE-2024-50282?
CVE-2024-50282 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a possible buffer overflow if size is larger than 4K. (...
How severe is CVE-2024-50282?
CVE-2024-50282 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-50282?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.