CVE-2024-27045 — Classic Buffer Overflow in Linux
Severity
7.8HIGHNVD
OSV7.0OSV6.5OSV5.5
EPSS
0.0%
top 96.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 1
Latest updateJul 26
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'
Tell snprintf() to store at most 10 bytes in the output buffer
instead of 30.
Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_debugfs.c:1508 dp_dsc_clock_en_read() error: snprintf() is printing too much 30 vs 10
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages9 packages
▶CVEListV5linux/linuxc06e09b76639657f284bfaf1cce29557a2515e85 — ff28893c96c5e0927a4da10cd24a3522ca663515+7
Patches
🔴Vulnerability Details
17📋Vendor Advisories
18💬Community
1Bugzilla▶
CVE-2024-27045 kernel: drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'↗2024-05-01