In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Do not return negative stream id for array
[WHY]
resource_stream_to_stream_idx returns an array index and it return -1
when not found; however, -1 is not a valid array index number.
[HOW]
When this happens, call ASSERT(), and return a zero instead.
This fixes an OVERRUN and an NEGATIVE_RETURNS issues reported by Coverity.
References
Configurations
History
29 Sep 2025, 14:57
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-125 | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/3ac31c9a707dd1c7c890b95333182f955e9dcb57 - Patch | |
| References | () https://git.kernel.org/stable/c/a76fa9c4f0fc0aa6f517da3fa7d7c23e8a32c7d0 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Linux
Linux linux Kernel |
Information
Published : 2024-07-30 08:15
Updated : 2025-09-29 14:57
NVD link : CVE-2024-42118
Mitre link : CVE-2024-42118
CVE.ORG link : CVE-2024-42118
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
