CVE-2024-52559

In the Linux kernel, the following vulnerability has been resolved: drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() The "submit->cmd[i].size" and "submit->cmd[i].offset" variables are u32 values that come from the user via the submit_lookup_cmds() function. This addition could lead to an integer wrapping bug so use size_add() to prevent that. Patchwork: https://patchwork.freedesktop.org/patch/624696/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

07 Mar 2025, 12:30

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-190
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/2b99b2c4621d13bd4374ef384e8f1fc188d0a5df - () https://git.kernel.org/stable/c/2b99b2c4621d13bd4374ef384e8f1fc188d0a5df - Patch
References () https://git.kernel.org/stable/c/2f1845e46c41ed500789d53dc45b383b7745c96c - () https://git.kernel.org/stable/c/2f1845e46c41ed500789d53dc45b383b7745c96c - Patch
References () https://git.kernel.org/stable/c/3a47f4b439beb98e955d501c609dfd12b7836d61 - () https://git.kernel.org/stable/c/3a47f4b439beb98e955d501c609dfd12b7836d61 - Patch
References () https://git.kernel.org/stable/c/e43a0f1327a1ee70754f8a0de6e0262cfa3e0b87 - () https://git.kernel.org/stable/c/e43a0f1327a1ee70754f8a0de6e0262cfa3e0b87 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/gem: evitar el desbordamiento de enteros en msm_ioctl_gem_submit() Las variables "submit->cmd[i].size" y "submit->cmd[i].offset" son valores u32 que provienen del usuario a través de la función submission_lookup_cmds(). Esta adición podría provocar un error de envoltura de enteros, por lo que se debe utilizar size_add() para evitarlo. Patchwork: https://patchwork.freedesktop.org/patch/624696/
First Time Linux
Linux linux Kernel

27 Feb 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/2b99b2c4621d13bd4374ef384e8f1fc188d0a5df -

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-03-07 12:30


NVD link : CVE-2024-52559

Mitre link : CVE-2024-52559

CVE.ORG link : CVE-2024-52559


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound