CVE-2024-46859
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/09/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses<br />
<br />
The panasonic laptop code in various places uses the SINF array with index<br />
values of 0 - SINF_CUR_BRIGHT(0x0d) without checking that the SINF array<br />
is big enough.<br />
<br />
Not all panasonic laptops have this many SINF array entries, for example<br />
the Toughbook CF-18 model only has 10 SINF array entries. So it only<br />
supports the AC+DC brightness entries and mute.<br />
<br />
Check that the SINF array has a minimum size which covers all AC+DC<br />
brightness entries and refuse to load if the SINF array is smaller.<br />
<br />
For higher SINF indexes hide the sysfs attributes when the SINF array<br />
does not contain an entry for that attribute, avoiding show()/store()<br />
accessing the array out of bounds and add bounds checking to the probe()<br />
and resume() code accessing these.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.3 (including) | 6.1.111 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.52 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/6821a82616f60aa72c5909b3e252ad97fb9f7e2a
- https://git.kernel.org/stable/c/9291fadbd2720a869b1d2fcf82305648e2e62a16
- https://git.kernel.org/stable/c/b38c19783286a71693c2194ed1b36665168c09c4
- https://git.kernel.org/stable/c/b7c2f692307fe704be87ea80d7328782b33c3cef
- https://git.kernel.org/stable/c/f52e98d16e9bd7dd2b3aef8e38db5cbc9899d6a4
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



