CVE-2024-47661

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid overflow from uint32_t to uint8_t [WHAT & HOW] dmub_rb_cmd's ramping_boundary has size of uint8_t and it is assigned 0xFFFF. Fix it by changing it to uint8_t with value of 0xFF. This fixes 2 INTEGER_OVERFLOW issues reported by Coverity.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

15 Oct 2024, 16:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/30d1b783b6eeaf49d311a072c70d618d993d01ec - () https://git.kernel.org/stable/c/30d1b783b6eeaf49d311a072c70d618d993d01ec - Patch
References () https://git.kernel.org/stable/c/d6b54900c564e35989cf6813e4071504fa0a90e0 - () https://git.kernel.org/stable/c/d6b54900c564e35989cf6813e4071504fa0a90e0 - Patch
CWE CWE-190

10 Oct 2024, 12:51

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: evitar el desbordamiento de uint32_t a uint8_t [QUÉ Y CÓMO] El tamaño de ramping_boundary de dmub_rb_cmd es uint8_t y se le asigna 0xFFFF. Solucione el problema cambiándolo a uint8_t con el valor 0xFF. Esto soluciona 2 problemas de INTEGER_OVERFLOW informados por Coverity.

09 Oct 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-09 15:15

Updated : 2024-10-15 16:03


NVD link : CVE-2024-47661

Mitre link : CVE-2024-47661

CVE.ORG link : CVE-2024-47661


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound