CVE-2024-46821
Published: September 28, 2024Last modified: September 28, 2024
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Fix negative array index read Avoid using the negative values for clk_idex as an index into an array pptable->DpmDescriptor. V2: fix clk_index return check (Tim Huang)
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.110-r0) |
Stream | linux-lts | Fixed (6.6.58-r0) |
References
- https://git.kernel.org/stable/c/06a3810010b525b9958424e344f0c25b09e128fa
- https://git.kernel.org/stable/c/4711b1347cb9f0c3083da6d87c624d75f9bd1d50
- https://git.kernel.org/stable/c/60f4a4bc3329e5cb8c4df0cc961f0d5ffd96e22d
- https://git.kernel.org/stable/c/befd1dc693c98bad69a701ede3a298698f0f9436
- https://git.kernel.org/stable/c/c8c19ebf7c0b202a6a2d37a52ca112432723db5f
- https://git.kernel.org/stable/c/e549cd6da1f21c34ba0f65adeca6a8aa9860b381