SB20240531193 - Out-of-bounds read in Linux kernel display amdgpu_dm driver
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2024-36914)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dm_resume(), get_highest_refresh_rate_mode() and amdgpu_dm_commit_audio() functions in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/951a498fa993c5501994ec2df97c9297b02488c7
- https://git.kernel.org/stable/c/e9baa7110e9f3756bd5a812af376c288d9be894d
- https://git.kernel.org/stable/c/ecedd99a9369fb5cde601ae9abd58bca2739f1ae
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.116
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.31
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8.10