{ "id": "CVE-2024-42118", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:04.097", "lastModified": "2024-07-30T13:32:45.943", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Do not return negative stream id for array\n\n[WHY]\nresource_stream_to_stream_idx returns an array index and it return -1\nwhen not found; however, -1 is not a valid array index number.\n\n[HOW]\nWhen this happens, call ASSERT(), and return a zero instead.\n\nThis fixes an OVERRUN and an NEGATIVE_RETURNS issues reported by Coverity." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: no devolver ID de flujo negativo para la matriz [POR QU\u00c9] Resource_stream_to_stream_idx devuelve un \u00edndice de matriz y devuelve -1 cuando no se encuentra; sin embargo, -1 no es un n\u00famero de \u00edndice de matriz v\u00e1lido. [C\u00d3MO] Cuando esto suceda, llame a ASSERT() y devuelva un cero en su lugar. Esto soluciona problemas de OVERRUN y NEGATIVE_RETURNS informados por Coverity." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/3ac31c9a707dd1c7c890b95333182f955e9dcb57", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/a76fa9c4f0fc0aa6f517da3fa7d7c23e8a32c7d0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] }