CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-44993

High Severity
Linux
SVRS
65/100

CVSSv3
7.1/10

EPSS
0.00039/1

CVE-2024-44993 is a vulnerability in the Linux kernel, specifically an out-of-bounds read within the v3d_csd_job_run() function in the V3D graphics driver. This flaw can occur when the system attempts to access memory beyond the allocated boundary of a configuration register array. The SVRS score of 65 indicates a moderate level of risk, suggesting prompt attention, though not necessarily immediate action. An attacker could potentially exploit this flaw to cause a system crash or potentially leak sensitive information from kernel memory. The vulnerability stems from reading beyond the defined size of the UAPI configuration registers, which are defined as seven, while the code attempts to access the eighth. This out-of-bounds read can lead to unpredictable behavior and system instability, particularly on systems like the Raspberry Pi 5. While the CVSS score is 7.1 indicating high severity, the slightly lower SVRS suggests that real-world exploitability might be somewhat limited, but mitigation is still advisable to maintain system integrity.

No tags available
CVSS:3.1
AV:L
AC:L
PR:L
UI:N
S:U
C:H
I:N
A:H
2024-09-04

2024-09-06

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

USN-7154-2: Linux kernel (HWE) vulnerabilities
2025-01-06
USN-7154-2: Linux kernel (HWE) vulnerabilities | Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - ATM drivers; - Drivers core; - Ublk userspace block driver; - Bluetooth drivers; - Character device driver; - Hardware crypto device drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand
ubuntu.com
rss
forum
news
CVE-2024-44993 | Linux Kernel up to 6.10.6 v3d_csd_job_run out-of-bounds (d656b82c4b30/497d370a644d / Nessus ID 212724)
vuldb.com2024-12-13
CVE-2024-44993 | Linux Kernel up to 6.10.6 v3d_csd_job_run out-of-bounds (d656b82c4b30/497d370a644d / Nessus ID 212724) | A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.10.6. This affects the function v3d_csd_job_run. The manipulation leads to out-of-bounds read. This vulnerability is uniquely identified as CVE-2024-44993. The attack needs to be
vuldb.com
rss
forum
news
USN-7154-1: Linux kernel vulnerabilities
2024-12-12
USN-7154-1: Linux kernel vulnerabilities | Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - ATM drivers; - Drivers core; - Ublk userspace block driver; - Bluetooth drivers; - Character device driver; - Hardware crypto device drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand drivers
ubuntu.com
rss
forum
news
USN-7155-1: Linux kernel (NVIDIA) vulnerabilities
2024-12-12
USN-7155-1: Linux kernel (NVIDIA) vulnerabilities | Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Android drivers; - ATM drivers; - Drivers core; - Ublk userspace block driver; - Bluetooth drivers; - Character device driver; - Hardware crypto device drivers; - Buffer Sharing and Synchronization framework; - DMA engine subsystem; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - Hardware monitoring drivers; - I2C subsystem; - I3C subsystem; - IIO subsystem; - InfiniBand
ubuntu.com
rss
forum
news

Social Media

CVE-2024-44993 In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Fix out-of-bounds read in `v3d_csd_job_run()` When enabling UBSAN on Raspberry Pi 5, we… https://t.co/CEpmWxk721
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
OSLinuxlinux_kernel

References

ReferenceLink
416BAAA9-DC9F-4396-8D5F-8C081FB06D67https://git.kernel.org/stable/c/497d370a644d95a9f04271aa92cb96d32e84c770
416BAAA9-DC9F-4396-8D5F-8C081FB06D67https://git.kernel.org/stable/c/d656b82c4b30cf12715e6cd129d3df808fde24a7

CWE Details

CWE IDCWE NameDescription
CWE-125Out-of-bounds ReadThe software reads data past the end, or before the beginning, of the intended buffer.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence