In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'
Tell snprintf() to store at most 10 bytes in the output buffer
instead of 30.
Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_debugfs.c:1508 dp_dsc_clock_en_read() error: snprintf() is printing too much 30 vs 10
References
Configurations
Configuration 1 (hide)
|
History
23 Dec 2024, 19:13
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-120 | |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/440f059837418fac1695b65d3ebc6080d33be877 - Patch | |
References | () https://git.kernel.org/stable/c/4b09715f1504f1b6e8dff0e9643630610bc05141 - Patch | |
References | () https://git.kernel.org/stable/c/ad76fd30557d6a106c481e4606a981221ca525f7 - Patch | |
References | () https://git.kernel.org/stable/c/cf114d8d4a8d78df272116a745bb43b48cef65f4 - Patch | |
References | () https://git.kernel.org/stable/c/d346b3e5b25c95d504478507eb867cd3818775ab - Patch | |
References | () https://git.kernel.org/stable/c/eb9327af3621d26b1d83f767c97a3fe8191a3a65 - Patch | |
References | () https://git.kernel.org/stable/c/ff28893c96c5e0927a4da10cd24a3522ca663515 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/440f059837418fac1695b65d3ebc6080d33be877 - | |
References | () https://git.kernel.org/stable/c/4b09715f1504f1b6e8dff0e9643630610bc05141 - | |
References | () https://git.kernel.org/stable/c/ad76fd30557d6a106c481e4606a981221ca525f7 - | |
References | () https://git.kernel.org/stable/c/cf114d8d4a8d78df272116a745bb43b48cef65f4 - | |
References | () https://git.kernel.org/stable/c/d346b3e5b25c95d504478507eb867cd3818775ab - | |
References | () https://git.kernel.org/stable/c/eb9327af3621d26b1d83f767c97a3fe8191a3a65 - | |
References | () https://git.kernel.org/stable/c/ff28893c96c5e0927a4da10cd24a3522ca663515 - |
05 Nov 2024, 10:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
01 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 13:15
Updated : 2024-12-23 19:13
NVD link : CVE-2024-27045
Mitre link : CVE-2024-27045
CVE.ORG link : CVE-2024-27045
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')