๐Ÿ” CVE Alert

CVE-2024-50134

UNKNOWN 0.0

drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA Replace the fake VLA at end of the vbva_mouse_pointer_shape shape with a real VLA to fix a "memcpy: detected field-spanning write error" warning: [ 13.319813] memcpy: detected field-spanning write (size 16896) of single field "p->data" at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 (size 4) [ 13.319841] WARNING: CPU: 0 PID: 1105 at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 hgsmi_update_pointer_shape+0x192/0x1c0 [vboxvideo] [ 13.320038] Call Trace: [ 13.320173] hgsmi_update_pointer_shape [vboxvideo] [ 13.320184] vbox_cursor_atomic_update [vboxvideo] Note as mentioned in the added comment it seems the original length calculation for the allocated and send hgsmi buffer is 4 bytes too large. Changing this is not the goal of this patch, so this behavior is kept.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 5, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
dd55d44f408419278c00887bfcb2261d0caae350 < 02c86c5d5ef4bbba17d38859c74872825f536617 dd55d44f408419278c00887bfcb2261d0caae350 < 75f828e944dacaac8870418461d3d48a1ecf2331 dd55d44f408419278c00887bfcb2261d0caae350 < 34a422274b693507025a7db21519865d1862afcb dd55d44f408419278c00887bfcb2261d0caae350 < 7458a6cdaebb3dc59af8578ee354fae78a154c4a dd55d44f408419278c00887bfcb2261d0caae350 < 9eb32bd23bbcec44bcbef27b7f282b7a7f3d0391 dd55d44f408419278c00887bfcb2261d0caae350 < fae9dc12c61ce23cf29d09824a741b7b1ff8f01f dd55d44f408419278c00887bfcb2261d0caae350 < d92b90f9a54d9300a6e883258e79f36dab53bfae
Linux / Linux
4.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/02c86c5d5ef4bbba17d38859c74872825f536617 git.kernel.org: https://git.kernel.org/stable/c/75f828e944dacaac8870418461d3d48a1ecf2331 git.kernel.org: https://git.kernel.org/stable/c/34a422274b693507025a7db21519865d1862afcb git.kernel.org: https://git.kernel.org/stable/c/7458a6cdaebb3dc59af8578ee354fae78a154c4a git.kernel.org: https://git.kernel.org/stable/c/9eb32bd23bbcec44bcbef27b7f282b7a7f3d0391 git.kernel.org: https://git.kernel.org/stable/c/fae9dc12c61ce23cf29d09824a741b7b1ff8f01f git.kernel.org: https://git.kernel.org/stable/c/d92b90f9a54d9300a6e883258e79f36dab53bfae lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html