Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Ensure index calculation will not overflow [WHY & HOW] Make sure vmid0p72_idx, vnom0p8_idx and vmax0p9_idx calculation will never overflow and exceess array size. This fixes 3 OVERRUN and 1 INTEGER_OVERFLOW issues reported by Coverity.

PUBLISHED Reserved 2024-09-11 | Published 2024-09-18 | Updated 2025-11-03 | Assigner Linux

Product status

Default status
unaffected

4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c (git) before 733ae185502d30bbe79575167b6178cfb6c5d6bd
affected

4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c (git) before 3dc6bb57dab36b38b7374af0ac916174c146b6ed
affected

4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c (git) before d705b5869f6b1b46ad5ceb1bd2a08c04f7e5003b
affected

4562236b3bc0a28aeb6ee93b2d8a849a4c4e1c7c (git) before 8e2734bf444767fed787305ccdcb36a2be5301a2
affected

Default status
affected

4.15
affected

Any version before 4.15
unaffected

6.1.109 (semver)
unaffected

6.6.50 (semver)
unaffected

6.10.9 (semver)
unaffected

6.11 (original_commit_for_fix)
unaffected

References

lists.debian.org/debian-lts-announce/2025/01/msg00001.html

git.kernel.org/...c/733ae185502d30bbe79575167b6178cfb6c5d6bd

git.kernel.org/...c/3dc6bb57dab36b38b7374af0ac916174c146b6ed

git.kernel.org/...c/d705b5869f6b1b46ad5ceb1bd2a08c04f7e5003b

git.kernel.org/...c/8e2734bf444767fed787305ccdcb36a2be5301a2

cve.org (CVE-2024-46726)

nvd.nist.gov (CVE-2024-46726)

Download JSON