In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Implement bounds check for stream encoder creation in DCN301
'stream_enc_regs' array is an array of dcn10_stream_enc_registers
structures. The array is initialized with four elements, corresponding
to the four calls to stream_enc_regs() in the array initializer. This
means that valid indices for this array are 0, 1, 2, and 3.
The error message 'stream_enc_regs' 4 <= 5 below, is indicating that
there is an attempt to access this array with an index of 5, which is
out of bounds. This could lead to undefined behavior
Here, eng_id is used as an index to access the stream_enc_regs array. If
eng_id is 5, this would result in an out-of-bounds access on the
stream_enc_regs array.
Thus fixing Buffer overflow error in dcn301_stream_encoder_create
reported by Smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: buffer overflow 'stream_enc_regs' 4 <= 5
References
Configurations
Configuration 1 (hide)
|
History
03 Mar 2025, 17:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054 - Patch | |
References | () https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2 - Patch | |
References | () https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738 - Patch | |
References | () https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d - Patch | |
References | () https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-125 | |
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054 - | |
References | () https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2 - | |
References | () https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738 - | |
References | () https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d - | |
References | () https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a - |
02 Apr 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-02 07:15
Updated : 2025-03-03 17:33
NVD link : CVE-2024-26660
Mitre link : CVE-2024-26660
CVE.ORG link : CVE-2024-26660
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read