In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix potential index out of bounds in color transformation function
Fixes index out of bounds issue in the color transformation function.
The issue could occur when the index 'i' exceeds the number of transfer
function points (TRANSFER_FUNC_POINTS).
The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds, an error message is
logged and the function returns false to indicate an error.
Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:405 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf->tf_pts.red' 1025 <= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:406 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf->tf_pts.green' 1025 <= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:407 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf->tf_pts.blue' 1025 <= s32max
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/04bc4d1090c343025d69149ca669a27c5b9c34a7 - Patch | |
References | () https://git.kernel.org/stable/c/123edbae64f4d21984359b99c6e79fcde31c6123 - Patch | |
References | () https://git.kernel.org/stable/c/4e8c8b37ee84b3b19c448d2b8e4c916d2f5b9c86 - Patch | |
References | () https://git.kernel.org/stable/c/604c506ca43fce52bb882cff9c1fdf2ec3b4029c - Patch | |
References | () https://git.kernel.org/stable/c/63ae548f1054a0b71678d0349c7dc9628ddd42ca - Patch | |
References | () https://git.kernel.org/stable/c/7226ddf3311c5e5a7726ad7d4e7b079bb3cfbb29 - Patch | |
References | () https://git.kernel.org/stable/c/98b8a6bfd30d07a19cfacdf82b50f84bf3360869 - Patch | |
References | () https://git.kernel.org/stable/c/ced9c4e2289a786b8fa684d8893b7045ea53ef7e - Patch | |
References | () https://git.kernel.org/stable/c/e280ab978c81443103d7c61bdd1d8d708cf6ed6d - Patch |
27 Aug 2024, 19:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-129 | |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/04bc4d1090c343025d69149ca669a27c5b9c34a7 - Patch | |
References | () https://git.kernel.org/stable/c/123edbae64f4d21984359b99c6e79fcde31c6123 - Patch | |
References | () https://git.kernel.org/stable/c/4e8c8b37ee84b3b19c448d2b8e4c916d2f5b9c86 - Patch | |
References | () https://git.kernel.org/stable/c/604c506ca43fce52bb882cff9c1fdf2ec3b4029c - Patch | |
References | () https://git.kernel.org/stable/c/63ae548f1054a0b71678d0349c7dc9628ddd42ca - Patch | |
References | () https://git.kernel.org/stable/c/7226ddf3311c5e5a7726ad7d4e7b079bb3cfbb29 - Patch | |
References | () https://git.kernel.org/stable/c/98b8a6bfd30d07a19cfacdf82b50f84bf3360869 - Patch | |
References | () https://git.kernel.org/stable/c/ced9c4e2289a786b8fa684d8893b7045ea53ef7e - Patch | |
References | () https://git.kernel.org/stable/c/e280ab978c81443103d7c61bdd1d8d708cf6ed6d - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
15 Jul 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Jun 2024, 12:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Jun 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-19 14:15
Updated : 2024-11-21 09:26
NVD link : CVE-2024-38552
Mitre link : CVE-2024-38552
CVE.ORG link : CVE-2024-38552
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index