CVE-2024-26922 — Improper Input Validation in Linux
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 23
Latest updateSep 18
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: validate the parameters of bo mapping operations more clearly
Verify the parameters of
amdgpu_vm_bo_(map/replace_map/clearing_mappings) in one common place.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages3 packages
▶CVEListV5linux/linuxdc54d3d1744d23ed0b345fd8bc1c493b74e8df44 — d4da6b084f1c5625937d49bb6722c5b4aef11b8d+8
Also affects: Debian Linux 10.0, Fedora 38, 39, 40
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-hpjm-r5wj-2jq3: In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: validate the parameters of bo mapping operations more clearly
Verify↗2024-04-23
OSV▶
CVE-2024-26922: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parameters of bo mapping operations more clearly Verify t↗2024-04-23
📋Vendor Advisories
27💬Community
1Bugzilla▶
CVE-2024-26922 kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly↗2024-04-23