In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Skip finding free audio for unknown engine_id
[WHY]
ENGINE_ID_UNKNOWN = -1 and can not be used as an array index. Plus, it
also means it is uninitialized and does not need free audio.
[HOW]
Skip and return NULL.
This fixes 2 OVERRUN issues reported by Coverity.
References
Configurations
Configuration 1 (hide)
|
History
03 Nov 2025, 22:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
29 Sep 2025, 15:01
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/1357b2165d9ad94faa4c4a20d5e2ce29c2ff29c3 - Patch | |
| References | () https://git.kernel.org/stable/c/874261358d31fc772f2823604167e670983cc1ca - Patch | |
| References | () https://git.kernel.org/stable/c/881fb6afc0004c5e6392ae2848f825bf051dae14 - Patch | |
| References | () https://git.kernel.org/stable/c/95ad20ee3c4efbb91f9a4ab08e070aa3697f5879 - Patch | |
| References | () https://git.kernel.org/stable/c/9eb4db08a808e3a3ba59193aeb84a57a6dc4d8c9 - Patch | |
| References | () https://git.kernel.org/stable/c/afaaebdee9bb9f26d9e13cc34b33bd0a7bf59488 - Patch | |
| References | () https://git.kernel.org/stable/c/eacca028a623f608607d02457122ee5284491e18 - Patch | |
| References | () https://git.kernel.org/stable/c/ffa7bd3ca9cfa902b857d1dc9a5f46fededf86c8 - Patch |
21 Nov 2024, 09:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/1357b2165d9ad94faa4c4a20d5e2ce29c2ff29c3 - | |
| References | () https://git.kernel.org/stable/c/874261358d31fc772f2823604167e670983cc1ca - | |
| References | () https://git.kernel.org/stable/c/881fb6afc0004c5e6392ae2848f825bf051dae14 - | |
| References | () https://git.kernel.org/stable/c/95ad20ee3c4efbb91f9a4ab08e070aa3697f5879 - | |
| References | () https://git.kernel.org/stable/c/9eb4db08a808e3a3ba59193aeb84a57a6dc4d8c9 - | |
| References | () https://git.kernel.org/stable/c/afaaebdee9bb9f26d9e13cc34b33bd0a7bf59488 - | |
| References | () https://git.kernel.org/stable/c/eacca028a623f608607d02457122ee5284491e18 - | |
| References | () https://git.kernel.org/stable/c/ffa7bd3ca9cfa902b857d1dc9a5f46fededf86c8 - |
30 Jul 2024, 13:32
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
30 Jul 2024, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-07-30 08:15
Updated : 2025-11-03 22:17
NVD link : CVE-2024-42119
Mitre link : CVE-2024-42119
CVE.ORG link : CVE-2024-42119
JSON object : View
Products Affected
linux
- linux_kernel
CWE
