We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50016

drm/amd/display: Avoid overflow assignment in link_dp_cts



Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid overflow assignment in link_dp_cts sampling_rate is an uint8_t but is assigned an unsigned int, and thus it can overflow. As a result, sampling_rate is changed to uint32_t. Similarly, LINK_QUAL_PATTERN_SET has a size of 2 bits, and it should only be assigned to a value less or equal than 4. This fixes 2 INTEGER_OVERFLOW issues reported by Coverity.

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2024-11-19 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f4 before a1495acc6234
affected

1da177e4c3f4 before 26ced9d86240
affected

1da177e4c3f4 before adeed800bc30
affected

1da177e4c3f4 before a15268787b79
affected

Default status
affected

6.6.55
unaffected

6.10.14
unaffected

6.11.3
unaffected

6.12
unaffected

References

git.kernel.org/...c/a1495acc6234fa79b775599d3f49009afd53299f

git.kernel.org/...c/26ced9d86240868f5b41708ceee02e6ec2924498

git.kernel.org/...c/adeed800bc30ef718478b28c08f79231e5980e3d

git.kernel.org/...c/a15268787b79fd183dd526cc16bec9af4f4e49a1

cve.org (CVE-2024-50016)

nvd.nist.gov (CVE-2024-50016)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50016

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.