CVE-2024-56784

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Adding array index check to prevent memory corruption [Why & How] Array indices out of bound caused memory corruption. Adding checks to ensure that array index stays in bound.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

09 Jan 2025, 21:25

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Se agregó una verificación del índice de la matriz para evitar la corrupción de la memoria [Por qué y cómo] Los índices de la matriz fuera de los límites causaron corrupción de la memoria. Se agregaron verificaciones para garantizar que el índice de la matriz permanezca dentro de los límites.
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/2c437d9a0b496168e1a1defd17b531f0a526dbe9 - () https://git.kernel.org/stable/c/2c437d9a0b496168e1a1defd17b531f0a526dbe9 - Patch
References () https://git.kernel.org/stable/c/dff526dc3e27f5484f5ba11471b9fbbe681467f2 - () https://git.kernel.org/stable/c/dff526dc3e27f5484f5ba11471b9fbbe681467f2 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787

08 Jan 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-08 18:15

Updated : 2025-01-09 21:25


NVD link : CVE-2024-56784

Mitre link : CVE-2024-56784

CVE.ORG link : CVE-2024-56784


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write