THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-26797

drm/amd/display: Prevent potential buffer overflow in map_hw_resources

AssignerLinux
Reserved2024-02-19
Published2024-04-04
Updated2024-07-16

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Prevent potential buffer overflow in map_hw_resources Adds a check in the map_hw_resources function to prevent a potential buffer overflow. The function was accessing arrays using an index that could potentially be greater than the size of the arrays, leading to a buffer overflow. Adds a check to ensure that the index is within the bounds of the arrays. If the index is out of bounds, an error message is printed and break it will continue execution with just ignoring extra data early to prevent the buffer overflow. Reported by smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/dml2/dml2_wrapper.c:79 map_hw_resources() error: buffer overflow 'dml2->v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_stream_id' 6 <= 7 drivers/gpu/drm/amd/amdgpu/../display/dc/dml2/dml2_wrapper.c:81 map_hw_resources() error: buffer overflow 'dml2->v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_plane_id' 6 <= 7

Product status

Default status
unaffected

7966f319c66d before 50a6302cf881
affected

7966f319c66d before 0f8ca019544a
affected

Default status
affected

6.7
affected

Any version before 6.7
unaffected

6.7.9
unaffected

6.8
unaffected

References

https://git.kernel.org/stable/c/50a6302cf881f67f1410461a68fe9eabd00ff31d

https://git.kernel.org/stable/c/0f8ca019544a252d1afb468ce840c6dcbac73af4

cve.org CVE-2024-26797

nvd.nist.gov CVE-2024-26797

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-26797
© Copyright 2024 THREATINT. Made in Cyprus with +