CVE-2024-46700: drm/amdgpu/mes: fix mes ring buffer overflow

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/mes: fix mes ring buffer overflow

wait memory room until enough before writing mes packets
to avoid ring buffer overflow.

v2: squash in sched_hw_submission fix

(cherry picked from commit 34e087e8920e635c62e2ed6a758b0cd27f836d13)

Classification

CVE ID: CVE-2024-46700

Affected Products

Vendor: Linux

Product: Linux

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.02% (probability of being exploited)

EPSS Percentile: 4.58% (scored less or equal to compared to others)

EPSS Date: 2025-05-05 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: partial

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-46700
https://git.kernel.org/stable/c/ed37550d7c516017c3b0324bdf144e2fa563ffb0
https://git.kernel.org/stable/c/11752c013f562a1124088a35bd314aa0e9f0e88f

Timeline