CVE-2024-46814
drm/amd/display: Check msg_id before processing transcation
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check msg_id before processing transcation [WHY & HOW] HDCP_MESSAGE_ID_INVALID (-1) is not a valid msg_id nor is it a valid array index, and it needs checking before used. This fixes 4 OVERRUN issues reported by Coverity.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Sep 27, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
4c283fdac08abf3211533f70623c90a34f41d08d < 916083054670060023d3f8a8ace895d710e268f4 4c283fdac08abf3211533f70623c90a34f41d08d < fe63daf7b10253b0faaa60c55d6153cd276927aa 4c283fdac08abf3211533f70623c90a34f41d08d < 0147505f08220c89b3a9c90eb608191276e263a8 4c283fdac08abf3211533f70623c90a34f41d08d < cb63090a17d3abb87f132851fa3711281249b7d2 4c283fdac08abf3211533f70623c90a34f41d08d < 6590643c5de74098d27933b7d224d5ac065d7755 4c283fdac08abf3211533f70623c90a34f41d08d < fa71face755e27dc44bc296416ebdf2c67163316
Linux / Linux
5.5
References
git.kernel.org: https://git.kernel.org/stable/c/916083054670060023d3f8a8ace895d710e268f4 git.kernel.org: https://git.kernel.org/stable/c/fe63daf7b10253b0faaa60c55d6153cd276927aa git.kernel.org: https://git.kernel.org/stable/c/0147505f08220c89b3a9c90eb608191276e263a8 git.kernel.org: https://git.kernel.org/stable/c/cb63090a17d3abb87f132851fa3711281249b7d2 git.kernel.org: https://git.kernel.org/stable/c/6590643c5de74098d27933b7d224d5ac065d7755 git.kernel.org: https://git.kernel.org/stable/c/fa71face755e27dc44bc296416ebdf2c67163316 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html