2024-07-30 14:03:15 +00:00

29 lines
1.6 KiB
JSON

{
"id": "CVE-2024-42118",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:04.097",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Do not return negative stream id for array\n\n[WHY]\nresource_stream_to_stream_idx returns an array index and it return -1\nwhen not found; however, -1 is not a valid array index number.\n\n[HOW]\nWhen this happens, call ASSERT(), and return a zero instead.\n\nThis fixes an OVERRUN and an NEGATIVE_RETURNS issues reported by Coverity."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: no devolver ID de flujo negativo para la matriz [POR QU\u00c9] Resource_stream_to_stream_idx devuelve un \u00edndice de matriz y devuelve -1 cuando no se encuentra; sin embargo, -1 no es un n\u00famero de \u00edndice de matriz v\u00e1lido. [C\u00d3MO] Cuando esto suceda, llame a ASSERT() y devuelva un cero en su lugar. Esto soluciona problemas de OVERRUN y NEGATIVE_RETURNS informados por Coverity."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/3ac31c9a707dd1c7c890b95333182f955e9dcb57",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a76fa9c4f0fc0aa6f517da3fa7d7c23e8a32c7d0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}