We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-27045

drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'



AssignerLinux
Reserved2024-02-19
Published2024-05-01
Updated2024-09-11

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()' Tell snprintf() to store at most 10 bytes in the output buffer instead of 30. Fixes the below: drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_debugfs.c:1508 dp_dsc_clock_en_read() error: snprintf() is printing too much 30 vs 10

Product status

Default status
unaffected

c06e09b76639 before ff28893c96c5
affected

c06e09b76639 before 440f05983741
affected

c06e09b76639 before d346b3e5b25c
affected

c06e09b76639 before ad76fd30557d
affected

c06e09b76639 before eb9327af3621
affected

c06e09b76639 before cf114d8d4a8d
affected

c06e09b76639 before 4b09715f1504
affected

Default status
affected

5.9
affected

Any version before 5.9
unaffected

5.10.214
unaffected

5.15.153
unaffected

6.1.83
unaffected

6.6.23
unaffected

6.7.11
unaffected

6.8.2
unaffected

6.9
unaffected

References

https://git.kernel.org/stable/c/ff28893c96c5e0927a4da10cd24a3522ca663515

https://git.kernel.org/stable/c/440f059837418fac1695b65d3ebc6080d33be877

https://git.kernel.org/stable/c/d346b3e5b25c95d504478507eb867cd3818775ab

https://git.kernel.org/stable/c/ad76fd30557d6a106c481e4606a981221ca525f7

https://git.kernel.org/stable/c/eb9327af3621d26b1d83f767c97a3fe8191a3a65

https://git.kernel.org/stable/c/cf114d8d4a8d78df272116a745bb43b48cef65f4

https://git.kernel.org/stable/c/4b09715f1504f1b6e8dff0e9643630610bc05141

https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

cve.org CVE-2024-27045

nvd.nist.gov CVE-2024-27045

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.