Buffer overflow in Linux kernel drm vboxvideo driver



| Updated: 2025-05-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-50134
CWE-ID CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Buffer overflow

EUVDB-ID: #VU99837

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50134

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the hgsmi_update_pointer_shape() function in drivers/gpu/drm/vboxvideo/hgsmi_base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 5.4 - 6.11.5

CPE2.3 External links

https://git.kernel.org/stable/c/34a422274b693507025a7db21519865d1862afcb
https://git.kernel.org/stable/c/7458a6cdaebb3dc59af8578ee354fae78a154c4a
https://git.kernel.org/stable/c/9eb32bd23bbcec44bcbef27b7f282b7a7f3d0391
https://git.kernel.org/stable/c/fae9dc12c61ce23cf29d09824a741b7b1ff8f01f
https://git.kernel.org/stable/c/d92b90f9a54d9300a6e883258e79f36dab53bfae
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.229
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.170
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.285
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.115
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11.6
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.59


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###