Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-46821

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-27 Sep, 2024 | 12:36
Updated At-04 May, 2025 | 09:35
Rejected At-
Credits

drm/amd/pm: Fix negative array index read

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Fix negative array index read Avoid using the negative values for clk_idex as an index into an array pptable->DpmDescriptor. V2: fix clk_index return check (Tim Huang)

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:27 Sep, 2024 | 12:36
Updated At:04 May, 2025 | 09:35
Rejected At:
▼CVE Numbering Authority (CNA)
drm/amd/pm: Fix negative array index read

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Fix negative array index read Avoid using the negative values for clk_idex as an index into an array pptable->DpmDescriptor. V2: fix clk_index return check (Tim Huang)

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/amd/pm/swsmu/smu11/navi10_ppt.c
Default Status
unaffected
Versions
Affected
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before befd1dc693c98bad69a701ede3a298698f0f9436 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e549cd6da1f21c34ba0f65adeca6a8aa9860b381 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 60f4a4bc3329e5cb8c4df0cc961f0d5ffd96e22d (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 4711b1347cb9f0c3083da6d87c624d75f9bd1d50 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 06a3810010b525b9958424e344f0c25b09e128fa (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before c8c19ebf7c0b202a6a2d37a52ca112432723db5f (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/gpu/drm/amd/pm/swsmu/smu11/navi10_ppt.c
Default Status
affected
Versions
Unaffected
  • From 5.10.236 through 5.10.* (semver)
  • From 5.15.180 through 5.15.* (semver)
  • From 6.1.109 through 6.1.* (semver)
  • From 6.6.50 through 6.6.* (semver)
  • From 6.10.9 through 6.10.* (semver)
  • From 6.11 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/befd1dc693c98bad69a701ede3a298698f0f9436
N/A
https://git.kernel.org/stable/c/e549cd6da1f21c34ba0f65adeca6a8aa9860b381
N/A
https://git.kernel.org/stable/c/60f4a4bc3329e5cb8c4df0cc961f0d5ffd96e22d
N/A
https://git.kernel.org/stable/c/4711b1347cb9f0c3083da6d87c624d75f9bd1d50
N/A
https://git.kernel.org/stable/c/06a3810010b525b9958424e344f0c25b09e128fa
N/A
https://git.kernel.org/stable/c/c8c19ebf7c0b202a6a2d37a52ca112432723db5f
N/A
Hyperlink: https://git.kernel.org/stable/c/befd1dc693c98bad69a701ede3a298698f0f9436
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e549cd6da1f21c34ba0f65adeca6a8aa9860b381
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/60f4a4bc3329e5cb8c4df0cc961f0d5ffd96e22d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4711b1347cb9f0c3083da6d87c624d75f9bd1d50
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/06a3810010b525b9958424e344f0c25b09e128fa
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c8c19ebf7c0b202a6a2d37a52ca112432723db5f
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:27 Sep, 2024 | 13:15
Updated At:04 Oct, 2024 | 17:06

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Fix negative array index read Avoid using the negative values for clk_idex as an index into an array pptable->DpmDescriptor. V2: fix clk_index return check (Tim Huang)

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions before 6.1.109(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.50(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.10.9(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-129Primarynvd@nist.gov
CWE ID: CWE-129
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/06a3810010b525b9958424e344f0c25b09e128fa416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/4711b1347cb9f0c3083da6d87c624d75f9bd1d50416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/60f4a4bc3329e5cb8c4df0cc961f0d5ffd96e22d416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/c8c19ebf7c0b202a6a2d37a52ca112432723db5f416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/06a3810010b525b9958424e344f0c25b09e128fa
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/4711b1347cb9f0c3083da6d87c624d75f9bd1d50
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/60f4a4bc3329e5cb8c4df0cc961f0d5ffd96e22d
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/c8c19ebf7c0b202a6a2d37a52ca112432723db5f
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found