Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2024-26797
HistoryApr 04, 2024 - 9:15 a.m.

CVE-2024-26797

2024-04-0409:15:08
Debian Security Bug Tracker
security-tracker.debian.org
6
linux kernel
vulnerability
buffer overflow
amd display
map_hw_resources
smatch
error message
out of bounds

7.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Prevent potential buffer overflow in map_hw_resources Adds a check in the map_hw_resources function to prevent a potential buffer overflow. The function was accessing arrays using an index that could potentially be greater than the size of the arrays, leading to a buffer overflow. Adds a check to ensure that the index is within the bounds of the arrays. If the index is out of bounds, an error message is printed and break it will continue execution with just ignoring extra data early to prevent the buffer overflow. Reported by smatch: drivers/gpu/drm/amd/amdgpu/…/display/dc/dml2/dml2_wrapper.c:79 map_hw_resources() error: buffer overflow ‘dml2->v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_stream_id’ 6 <= 7 drivers/gpu/drm/amd/amdgpu/…/display/dc/dml2/dml2_wrapper.c:81 map_hw_resources() error: buffer overflow ‘dml2->v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_plane_id’ 6 <= 7

7.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for DEBIANCVE:CVE-2024-26797