#VU97510 Out-of-bounds read in Linux kernel


Vulnerability identifier: #VU97510

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-46724

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the df_v1_7_get_hbm_channel_number() function in drivers/gpu/drm/amd/amdgpu/df_v1_7.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
http://git.kernel.org/stable/c/725b728cc0c8c5fafdfb51cb0937870d33a40fa4
http://git.kernel.org/stable/c/45f7b02afc464c208e8f56bcbc672ef5c364c815
http://git.kernel.org/stable/c/32915dc909ff502823babfe07d5416c5b6e8a8b1
http://git.kernel.org/stable/c/f9267972490f9fcffe146e79828e97acc0da588c
http://git.kernel.org/stable/c/db7a86676fd624768a5d907faf34ad7bb4ff25f4
http://git.kernel.org/stable/c/d768394fa99467bcf2703bde74ddc96eeb0b71fa


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability