In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix potential index out of bounds in color transformation function
Fixes index out of bounds issue in the color transformation function.
The issue could occur when the index 'i' exceeds the number of transfer
function points (TRANSFER_FUNC_POINTS).
The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds, an error message is
logged and the function returns false to indicate an error.
Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:405 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf->tf_pts.red' 1025 <= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:406 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf->tf_pts.green' 1025 <= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:407 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf->tf_pts.blue' 1025 <= s32max
References
Configurations
Configuration 1 (hide)
|
History
27 Aug 2024, 19:55
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-129 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | () https://git.kernel.org/stable/c/04bc4d1090c343025d69149ca669a27c5b9c34a7 - Patch | |
References | () https://git.kernel.org/stable/c/123edbae64f4d21984359b99c6e79fcde31c6123 - Patch | |
References | () https://git.kernel.org/stable/c/4e8c8b37ee84b3b19c448d2b8e4c916d2f5b9c86 - Patch | |
References | () https://git.kernel.org/stable/c/604c506ca43fce52bb882cff9c1fdf2ec3b4029c - Patch | |
References | () https://git.kernel.org/stable/c/63ae548f1054a0b71678d0349c7dc9628ddd42ca - Patch | |
References | () https://git.kernel.org/stable/c/7226ddf3311c5e5a7726ad7d4e7b079bb3cfbb29 - Patch | |
References | () https://git.kernel.org/stable/c/98b8a6bfd30d07a19cfacdf82b50f84bf3360869 - Patch | |
References | () https://git.kernel.org/stable/c/ced9c4e2289a786b8fa684d8893b7045ea53ef7e - Patch | |
References | () https://git.kernel.org/stable/c/e280ab978c81443103d7c61bdd1d8d708cf6ed6d - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
15 Jul 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Jun 2024, 12:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Jun 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-19 14:15
Updated : 2024-08-27 19:55
NVD link : CVE-2024-38552
Mitre link : CVE-2024-38552
CVE.ORG link : CVE-2024-38552
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index