CVE-2024-26797
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
04/04/2024
Last modified:
04/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/amd/display: Prevent potential buffer overflow in map_hw_resources<br />
<br />
Adds a check in the map_hw_resources function to prevent a potential<br />
buffer overflow. The function was accessing arrays using an index that<br />
could potentially be greater than the size of the arrays, leading to a<br />
buffer overflow.<br />
<br />
Adds a check to ensure that the index is within the bounds of the<br />
arrays. If the index is out of bounds, an error message is printed and<br />
break it will continue execution with just ignoring extra data early to<br />
prevent the buffer overflow.<br />
<br />
Reported by smatch:<br />
drivers/gpu/drm/amd/amdgpu/../display/dc/dml2/dml2_wrapper.c:79 map_hw_resources() error: buffer overflow &#39;dml2->v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_stream_id&#39; 6 v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_plane_id&#39; 6
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



