drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
Initialize the size before calling amdgpu_vce_cs_reloc, such as case 0x03000001.
V2: To really improve the handling we would actually
need to have a separate value of 0xffffffff.(Christian)
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3912-1 | linux security update |
Debian DLA |
DLA-4008-1 | linux-6.1 security update |
Debian DSA |
DSA-5782-1 | linux security update |
Ubuntu USN |
USN-7020-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7020-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7020-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7020-4 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7021-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7021-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7021-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7021-4 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7021-5 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7022-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7022-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7022-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7028-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7028-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7029-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7039-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7119-1 | Linux kernel (IoT) vulnerabilities |
Ubuntu USN |
USN-7156-1 | Linux kernel (GKE) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 04 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Eus
|
|
| CPEs | cpe:/a:redhat:rhel_eus:9.4 | |
| Vendors & Products |
Redhat rhel Eus
|
Wed, 13 Nov 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
Tue, 05 Nov 2024 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Sep 2024 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:8 |
Tue, 24 Sep 2024 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8::nfv | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Wed, 11 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Sep 2024 12:15:00 +0000
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-11-03T22:02:31.909Z
Reserved: 2024-07-30T07:40:12.250Z
Link: CVE-2024-42228
Updated: 2025-11-03T22:02:31.909Z
Status : Modified
Published: 2024-07-30T08:15:07.960
Modified: 2025-11-03T22:17:44.917
Link: CVE-2024-42228
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN