CVE-2024-52559

Source
https://cve.org/CVERecord?id=CVE-2024-52559
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-52559.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-52559
Downstream
Related
Published
2025-02-27T02:18:07.106Z
Modified
2026-05-07T04:16:19.221402Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit()
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/gem: prevent integer overflow in msmioctlgem_submit()

The "submit->cmd[i].size" and "submit->cmd[i].offset" variables are u32 values that come from the user via the submitlookupcmds() function. This addition could lead to an integer wrapping bug so use size_add() to prevent that.

Patchwork: https://patchwork.freedesktop.org/patch/624696/

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/52xxx/CVE-2024-52559.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
198725337ef1f73b73e7dc953c6ffb0799f26ffe
Fixed
2b99b2c4621d13bd4374ef384e8f1fc188d0a5df
Fixed
2f1845e46c41ed500789d53dc45b383b7745c96c
Fixed
e43a0f1327a1ee70754f8a0de6e0262cfa3e0b87
Fixed
3a47f4b439beb98e955d501c609dfd12b7836d61

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-52559.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.12.0
Fixed
6.6.80
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.16
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-52559.json"