CVE-2024-52557

In the Linux kernel, the following vulnerability has been resolved: drm: zynqmp_dp: Fix integer overflow in zynqmp_dp_rate_get() This patch fixes a potential integer overflow in the zynqmp_dp_rate_get() The issue comes up when the expression drm_dp_bw_code_to_link_rate(dp->test.bw_code) * 10000 is evaluated using 32-bit Now the constant is a compatible 64-bit type. Resolves coverity issues: CID 1636340 and CID 1635811
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

07 Mar 2025, 12:30

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/325d889c5403ba20a24097f64c32d27ab993c2c3 - () https://git.kernel.org/stable/c/325d889c5403ba20a24097f64c32d27ab993c2c3 - Patch
References () https://git.kernel.org/stable/c/67a615c5cb6dc33ed35492dc0d67e496cbe8de68 - () https://git.kernel.org/stable/c/67a615c5cb6dc33ed35492dc0d67e496cbe8de68 - Patch
First Time Linux linux Kernel
Linux
CWE CWE-190
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm: zynqmp_dp: corrige el desbordamiento de enteros en zynqmp_dp_rate_get() Este parche corrige un posible desbordamiento de enteros en zynqmp_dp_rate_get() El problema surge cuando la expresión drm_dp_bw_code_to_link_rate(dp->test.bw_code) * 10000 se evalúa utilizando 32 bits Ahora la constante es un tipo compatible de 64 bits. Resuelve problemas de cobertura: CID 1636340 y CID 1635811

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-03-07 12:30


NVD link : CVE-2024-52557

Mitre link : CVE-2024-52557

CVE.ORG link : CVE-2024-52557


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound