CVE-2024-46896
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
11/01/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/amdgpu: don&#39;t access invalid sched<br />
<br />
Since 2320c9e6a768 ("drm/sched: memset() &#39;job&#39; in drm_sched_job_init()")<br />
accessing job->base.sched can produce unexpected results as the initialisation<br />
of (*job)->base.sched done in amdgpu_job_alloc is overwritten by the<br />
memset.<br />
<br />
This commit fixes an issue when a CS would fail validation and would<br />
be rejected after job->num_ibs is incremented. In this case,<br />
amdgpu_ib_free(ring->adev, ...) will be called, which would crash the<br />
machine because the ring value is bogus.<br />
<br />
To fix this, pass a NULL pointer to amdgpu_ib_free(): we can do this<br />
because the device is actually not used in this function.<br />
<br />
The next commit will remove the ring argument completely.<br />
<br />
(cherry picked from commit 2ae520cb12831d264ceb97c61f72c59d33c0dbd7)
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.120 (including) | 6.1.122 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.66 (including) | 6.6.68 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.5 (including) | 6.12.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/65501a4fd84ecdc0af863dbb37759242aab9f2dd
- https://git.kernel.org/stable/c/67291d601f2b032062b1b2f60ffef1b63e10094c
- https://git.kernel.org/stable/c/a93b1020eb9386d7da11608477121b10079c076a
- https://git.kernel.org/stable/c/da6b2c626ae73c303378ce9eaf6e3eaf16c9925a
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



