Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-50134
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-05 Nov, 2024 | 17:10
Updated At-03 Nov, 2025 | 22:25
Rejected At-
▼CVE Numbering Authority (CNA)
drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA

In the Linux kernel, the following vulnerability has been resolved: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA Replace the fake VLA at end of the vbva_mouse_pointer_shape shape with a real VLA to fix a "memcpy: detected field-spanning write error" warning: [ 13.319813] memcpy: detected field-spanning write (size 16896) of single field "p->data" at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 (size 4) [ 13.319841] WARNING: CPU: 0 PID: 1105 at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 hgsmi_update_pointer_shape+0x192/0x1c0 [vboxvideo] [ 13.320038] Call Trace: [ 13.320173] hgsmi_update_pointer_shape [vboxvideo] [ 13.320184] vbox_cursor_atomic_update [vboxvideo] Note as mentioned in the added comment it seems the original length calculation for the allocated and send hgsmi buffer is 4 bytes too large. Changing this is not the goal of this patch, so this behavior is kept.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/vboxvideo/hgsmi_base.c
  • drivers/gpu/drm/vboxvideo/vboxvideo.h
Default Status
unaffected
Versions
Affected
  • From dd55d44f408419278c00887bfcb2261d0caae350 before 02c86c5d5ef4bbba17d38859c74872825f536617 (git)
  • From dd55d44f408419278c00887bfcb2261d0caae350 before 75f828e944dacaac8870418461d3d48a1ecf2331 (git)
  • From dd55d44f408419278c00887bfcb2261d0caae350 before 34a422274b693507025a7db21519865d1862afcb (git)
  • From dd55d44f408419278c00887bfcb2261d0caae350 before 7458a6cdaebb3dc59af8578ee354fae78a154c4a (git)
  • From dd55d44f408419278c00887bfcb2261d0caae350 before 9eb32bd23bbcec44bcbef27b7f282b7a7f3d0391 (git)
  • From dd55d44f408419278c00887bfcb2261d0caae350 before fae9dc12c61ce23cf29d09824a741b7b1ff8f01f (git)
  • From dd55d44f408419278c00887bfcb2261d0caae350 before d92b90f9a54d9300a6e883258e79f36dab53bfae (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/vboxvideo/hgsmi_base.c
  • drivers/gpu/drm/vboxvideo/vboxvideo.h
Default Status
affected
Versions
Affected
  • 4.13
Unaffected
  • From 0 before 4.13 (semver)
  • From 5.4.285 through 5.4.* (semver)
  • From 5.10.229 through 5.10.* (semver)
  • From 5.15.170 through 5.15.* (semver)
  • From 6.1.115 through 6.1.* (semver)
  • From 6.6.59 through 6.6.* (semver)
  • From 6.11.6 through 6.11.* (semver)
  • From 6.12 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/02c86c5d5ef4bbba17d38859c74872825f536617
N/A
https://git.kernel.org/stable/c/75f828e944dacaac8870418461d3d48a1ecf2331
N/A
https://git.kernel.org/stable/c/34a422274b693507025a7db21519865d1862afcb
N/A
https://git.kernel.org/stable/c/7458a6cdaebb3dc59af8578ee354fae78a154c4a
N/A
https://git.kernel.org/stable/c/9eb32bd23bbcec44bcbef27b7f282b7a7f3d0391
N/A
https://git.kernel.org/stable/c/fae9dc12c61ce23cf29d09824a741b7b1ff8f01f
N/A
https://git.kernel.org/stable/c/d92b90f9a54d9300a6e883258e79f36dab53bfae
N/A
Hyperlink: https://git.kernel.org/stable/c/02c86c5d5ef4bbba17d38859c74872825f536617
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/75f828e944dacaac8870418461d3d48a1ecf2331
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/34a422274b693507025a7db21519865d1862afcb
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7458a6cdaebb3dc59af8578ee354fae78a154c4a
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9eb32bd23bbcec44bcbef27b7f282b7a7f3d0391
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/fae9dc12c61ce23cf29d09824a741b7b1ff8f01f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d92b90f9a54d9300a6e883258e79f36dab53bfae
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
N/A
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Resource: N/A
Details not found