-
CVE-2024-26922
- EPSS 0.12%
- Veröffentlicht 23.04.2024 13:15:46
- Zuletzt bearbeitet 21.11.2024 09:03:23
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parameters of bo mapping operations more clearly Verify the parameters of amdgpu_vm_bo_(map/replace_map/clearing_mappings) in one common place.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
d4da6b084f1c5625937d49bb6722c5b4aef11b8d
Version
dc54d3d1744d23ed0b345fd8bc1c493b74e8df44
Status
affected
Version <
f68039375d4d6d67303674c0ab2d06b7295c0ec9
Version
dc54d3d1744d23ed0b345fd8bc1c493b74e8df44
Status
affected
Version <
1fd7db5c16028dc07b2ceec190f2e895dddb532d
Version
dc54d3d1744d23ed0b345fd8bc1c493b74e8df44
Status
affected
Version <
8b12fc7b032633539acdf7864888b0ebd49e90f2
Version
dc54d3d1744d23ed0b345fd8bc1c493b74e8df44
Status
affected
Version <
212e3baccdb1939606420d88f7f52d346b49a284
Version
dc54d3d1744d23ed0b345fd8bc1c493b74e8df44
Status
affected
Version <
ef13eeca7c79136bc38e21eb67322c1cbd5c40ee
Version
dc54d3d1744d23ed0b345fd8bc1c493b74e8df44
Status
affected
Version <
b1f04b9b1c5317f562a455384c5f7473e46bdbaa
Version
dc54d3d1744d23ed0b345fd8bc1c493b74e8df44
Status
affected
Version <
6fef2d4c00b5b8561ad68dd2b68173f5c6af1e75
Version
dc54d3d1744d23ed0b345fd8bc1c493b74e8df44
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.12
Status
affected
Version <
4.12
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.313
Status
unaffected
Version <=
5.4.*
Version
5.4.275
Status
unaffected
Version <=
5.10.*
Version
5.10.216
Status
unaffected
Version <=
5.15.*
Version
5.15.157
Status
unaffected
Version <=
6.1.*
Version
6.1.88
Status
unaffected
Version <=
6.6.*
Version
6.6.29
Status
unaffected
Version <=
6.8.*
Version
6.8.8
Status
unaffected
Version <=
*
Version
6.9
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.12% | 0.31 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|