CVE-2024-26660

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Implement bounds check for stream encoder creation in DCN301 'stream_enc_regs' array is an array of dcn10_stream_enc_registers structures. The array is initialized with four elements, corresponding to the four calls to stream_enc_regs() in the array initializer. This means that valid indices for this array are 0, 1, 2, and 3. The error message 'stream_enc_regs' 4 <= 5 below, is indicating that there is an attempt to access this array with an index of 5, which is out of bounds. This could lead to undefined behavior Here, eng_id is used as an index to access the stream_enc_regs array. If eng_id is 5, this would result in an out-of-bounds access on the stream_enc_regs array. Thus fixing Buffer overflow error in dcn301_stream_encoder_create reported by Smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: buffer overflow 'stream_enc_regs' 4 <= 5
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

History

03 Mar 2025, 17:33

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-125
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054 - () https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054 - Patch
References () https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2 - () https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2 - Patch
References () https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738 - () https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738 - Patch
References () https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d - () https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d - Patch
References () https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a - () https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a - Patch

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054 - () https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054 -
References () https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2 - () https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2 -
References () https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738 - () https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738 -
References () https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d - () https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d -
References () https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a - () https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a -

02 Apr 2024, 12:50

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: drm/amd/display: implementar la verificación de los límites para la creación del codificador de flujo en la matriz DCN301 'stream_enc_regs' es una matriz de estructuras dcn10_stream_enc_registers. La matriz se inicializa con cuatro elementos, correspondientes a las cuatro llamadas a stream_enc_regs() en el inicializador de la matriz. Esto significa que los índices válidos para esta matriz son 0, 1, 2 y 3. El mensaje de error 'stream_enc_regs' 4 &lt;= 5 a continuación indica que hay un intento de acceder a esta matriz con un índice de 5, que no está disponible. de los límites. Esto podría provocar un comportamiento indefinido. Aquí, eng_id se utiliza como índice para acceder a la matriz stream_enc_regs. Si eng_id es 5, esto daría como resultado un acceso fuera de los límites en la matriz stream_enc_regs. Solucionando así el error de desbordamiento de búfer en dcn301_stream_encoder_create informado por Smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: desbordamiento de búfer 'stream_enc_regs' 4 &lt;= 5

02 Apr 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-02 07:15

Updated : 2025-03-03 17:33


NVD link : CVE-2024-26660

Mitre link : CVE-2024-26660

CVE.ORG link : CVE-2024-26660


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read