CVE-2024-40988

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: fix UBSAN warning in kv_dpm.c Adds bounds check for sumo_vid_mapping_entry.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*

History

03 Nov 2025, 22:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html -

06 Oct 2025, 20:56

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/07e8f15fa16695cf4c90e89854e59af4a760055b - () https://git.kernel.org/stable/c/07e8f15fa16695cf4c90e89854e59af4a760055b - Patch
References () https://git.kernel.org/stable/c/468a50fd46a09bba7ba18a11054ae64b6479ecdc - () https://git.kernel.org/stable/c/468a50fd46a09bba7ba18a11054ae64b6479ecdc - Patch
References () https://git.kernel.org/stable/c/9e57611182a817824a17b1c3dd300ee74a174b42 - () https://git.kernel.org/stable/c/9e57611182a817824a17b1c3dd300ee74a174b42 - Patch
References () https://git.kernel.org/stable/c/a498df5421fd737d11bfd152428ba6b1c8538321 - () https://git.kernel.org/stable/c/a498df5421fd737d11bfd152428ba6b1c8538321 - Patch
References () https://git.kernel.org/stable/c/a8c6df9fe5bc390645d1e96eff14ffe414951aad - () https://git.kernel.org/stable/c/a8c6df9fe5bc390645d1e96eff14ffe414951aad - Patch
References () https://git.kernel.org/stable/c/cf1cc8fcfe517e108794fb711f7faabfca0dc855 - () https://git.kernel.org/stable/c/cf1cc8fcfe517e108794fb711f7faabfca0dc855 - Patch
References () https://git.kernel.org/stable/c/f803532bc3825384100dfc58873e035d77248447 - () https://git.kernel.org/stable/c/f803532bc3825384100dfc58873e035d77248447 - Patch
References () https://git.kernel.org/stable/c/febe794b83693257f21a23d2e03ea695a62449c8 - () https://git.kernel.org/stable/c/febe794b83693257f21a23d2e03ea695a62449c8 - Patch
CWE CWE-119
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel

Information

Published : 2024-07-12 13:15

Updated : 2025-11-03 22:17


NVD link : CVE-2024-40988

Mitre link : CVE-2024-40988

CVE.ORG link : CVE-2024-40988


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer