CVE-2024-46871

high

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller number to create array dmub_callback & dmub_thread_offload has potential to access item out of array bound. Fix it.

References

https://git.kernel.org/stable/c/e1896f381d27466c26cb44b4450eae05cd59dfd0

https://git.kernel.org/stable/c/c592b6355b9b57b8e59fc5978ce1e14f64488a98

https://git.kernel.org/stable/c/ad28d7c3d989fc5689581664653879d664da76f0

https://git.kernel.org/stable/c/9f404b0bc2df3880758fb3c3bc7496f596f347d7

https://git.kernel.org/stable/c/800a5ab673c4a61ca220cce177386723d91bdb37

Details

Source: Mitre, NVD

Published: 2024-10-09

Updated: 2024-12-14

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High