CVE-2024-27045

Source
https://cve.org/CVERecord?id=CVE-2024-27045
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27045.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27045
Downstream
Related
Published
2024-05-01T12:54:18.138Z
Modified
2026-03-13T07:52:02.977119Z
Summary
drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix a potential buffer overflow in 'dpdscclockenread()'

Tell snprintf() to store at most 10 bytes in the output buffer instead of 30.

Fixes the below: drivers/gpu/drm/amd/amdgpu/../display/amdgpudm/amdgpudmdebugfs.c:1508 dpdscclocken_read() error: snprintf() is printing too much 30 vs 10

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27045.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c06e09b76639657f284bfaf1cce29557a2515e85
Fixed
ff28893c96c5e0927a4da10cd24a3522ca663515
Fixed
440f059837418fac1695b65d3ebc6080d33be877
Fixed
d346b3e5b25c95d504478507eb867cd3818775ab
Fixed
ad76fd30557d6a106c481e4606a981221ca525f7
Fixed
eb9327af3621d26b1d83f767c97a3fe8191a3a65
Fixed
cf114d8d4a8d78df272116a745bb43b48cef65f4
Fixed
4b09715f1504f1b6e8dff0e9643630610bc05141

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27045.json"