In the Linux kernel, the following vulnerability has been resolved:
drm: zynqmp_dp: Fix integer overflow in zynqmp_dp_rate_get()
This patch fixes a potential integer overflow in the zynqmp_dp_rate_get()
The issue comes up when the expression
drm_dp_bw_code_to_link_rate(dp->test.bw_code) * 10000 is evaluated using 32-bit
Now the constant is a compatible 64-bit type.
Resolves coverity issues: CID 1636340 and CID 1635811
References
Configurations
History
07 Mar 2025, 12:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/325d889c5403ba20a24097f64c32d27ab993c2c3 - Patch | |
References | () https://git.kernel.org/stable/c/67a615c5cb6dc33ed35492dc0d67e496cbe8de68 - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-190 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
Summary |
|
27 Feb 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 03:15
Updated : 2025-03-07 12:30
NVD link : CVE-2024-52557
Mitre link : CVE-2024-52557
CVE.ORG link : CVE-2024-52557
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-190
Integer Overflow or Wraparound