๐Ÿ” CVE Alert

CVE-2024-50096

MEDIUM 5.5

nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error The `nouveau_dmem_copy_one` function ensures that the copy push command is sent to the device firmware but does not track whether it was executed successfully. In the case of a copy error (e.g., firmware or hardware failure), the copy push command will be sent via the firmware channel, and `nouveau_dmem_copy_one` will likely report success, leading to the `migrate_to_ram` function returning a dirty HIGH_USER page to the user. This can result in a security vulnerability, as a HIGH_USER page that may contain sensitive or corrupted data could be returned to the user. To prevent this vulnerability, we allocate a zero page. Thus, in case of an error, a non-dirty (zero) page will be returned to the user.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 5, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5be73b690875f7eb2d2defb54ccd7f2f12074984 < fd9bb7e996bab9b9049fffe3f3d3b50dee191d27 5be73b690875f7eb2d2defb54ccd7f2f12074984 < 73f75d2b5aee5a735cf64b8ab4543d5c20dbbdd9 5be73b690875f7eb2d2defb54ccd7f2f12074984 < 8c3de9282dde21ce3c1bf1bde3166a4510547aa9 5be73b690875f7eb2d2defb54ccd7f2f12074984 < 614bfb2050982d23d53d0d51c4079dba0437c883 5be73b690875f7eb2d2defb54ccd7f2f12074984 < 697e3ddcf1f8b68bd531fc34eead27c000bdf3e1 5be73b690875f7eb2d2defb54ccd7f2f12074984 < ab4d113b6718b076046018292f821d5aa4b844f8 5be73b690875f7eb2d2defb54ccd7f2f12074984 < 835745a377a4519decd1a36d6b926e369b3033e2
Linux / Linux
5.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/fd9bb7e996bab9b9049fffe3f3d3b50dee191d27 git.kernel.org: https://git.kernel.org/stable/c/73f75d2b5aee5a735cf64b8ab4543d5c20dbbdd9 git.kernel.org: https://git.kernel.org/stable/c/8c3de9282dde21ce3c1bf1bde3166a4510547aa9 git.kernel.org: https://git.kernel.org/stable/c/614bfb2050982d23d53d0d51c4079dba0437c883 git.kernel.org: https://git.kernel.org/stable/c/697e3ddcf1f8b68bd531fc34eead27c000bdf3e1 git.kernel.org: https://git.kernel.org/stable/c/ab4d113b6718b076046018292f821d5aa4b844f8 git.kernel.org: https://git.kernel.org/stable/c/835745a377a4519decd1a36d6b926e369b3033e2 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html