cvelist/2024/46xxx/CVE-2024-46896.json
2025-01-11 13:00:59 +00:00

139 lines
7.4 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-46896",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: don't access invalid sched\n\nSince 2320c9e6a768 (\"drm/sched: memset() 'job' in drm_sched_job_init()\")\naccessing job->base.sched can produce unexpected results as the initialisation\nof (*job)->base.sched done in amdgpu_job_alloc is overwritten by the\nmemset.\n\nThis commit fixes an issue when a CS would fail validation and would\nbe rejected after job->num_ibs is incremented. In this case,\namdgpu_ib_free(ring->adev, ...) will be called, which would crash the\nmachine because the ring value is bogus.\n\nTo fix this, pass a NULL pointer to amdgpu_ib_free(): we can do this\nbecause the device is actually not used in this function.\n\nThe next commit will remove the ring argument completely.\n\n(cherry picked from commit 2ae520cb12831d264ceb97c61f72c59d33c0dbd7)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "166df51487f46b6e997dfeea7ca0c2a970853f07",
"version_value": "65501a4fd84ecdc0af863dbb37759242aab9f2dd"
},
{
"version_affected": "<",
"version_name": "87210234e5a273ebf9c4110a6aa82b8221478daa",
"version_value": "da6b2c626ae73c303378ce9eaf6e3eaf16c9925a"
},
{
"version_affected": "<",
"version_name": "2da108b4b5fb7ec04d7e951418ed80e97f7c35ad",
"version_value": "67291d601f2b032062b1b2f60ffef1b63e10094c"
},
{
"version_affected": "<",
"version_name": "2320c9e6a768d135c7b0039995182bb1a4e4fd22",
"version_value": "a93b1020eb9386d7da11608477121b10079c076a"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "6.13-rc1",
"status": "affected"
},
{
"version": "0",
"lessThan": "6.13-rc1",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.1.122",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.6.68",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.12.7",
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.13-rc4",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/65501a4fd84ecdc0af863dbb37759242aab9f2dd",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/65501a4fd84ecdc0af863dbb37759242aab9f2dd"
},
{
"url": "https://git.kernel.org/stable/c/da6b2c626ae73c303378ce9eaf6e3eaf16c9925a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/da6b2c626ae73c303378ce9eaf6e3eaf16c9925a"
},
{
"url": "https://git.kernel.org/stable/c/67291d601f2b032062b1b2f60ffef1b63e10094c",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/67291d601f2b032062b1b2f60ffef1b63e10094c"
},
{
"url": "https://git.kernel.org/stable/c/a93b1020eb9386d7da11608477121b10079c076a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a93b1020eb9386d7da11608477121b10079c076a"
}
]
},
"generator": {
"engine": "bippy-5f407fcff5a0"
}
}