[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2024-27045Date: (C)2024-06-19   (M)2024-06-27


In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()' Tell snprintf() to store at most 10 bytes in the output buffer instead of 30. Fixes the below: drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_debugfs.c:1508 dp_dsc_clock_en_read() error: snprintf() is printing too much 30 vs 10

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.5CVSS Score :
Exploit Score: Exploit Score:
Impact Score: Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector:
Attack Complexity: Access Complexity:
Privileges Required: Authentication:
User Interaction: Confidentiality:
Scope: Integrity:
Confidentiality: Availability:
Integrity:  
Availability:  
  
Reference:
https://git.kernel.org/stable/c/440f059837418fac1695b65d3ebc6080d33be877
https://git.kernel.org/stable/c/4b09715f1504f1b6e8dff0e9643630610bc05141
https://git.kernel.org/stable/c/ad76fd30557d6a106c481e4606a981221ca525f7
https://git.kernel.org/stable/c/cf114d8d4a8d78df272116a745bb43b48cef65f4
https://git.kernel.org/stable/c/d346b3e5b25c95d504478507eb867cd3818775ab
https://git.kernel.org/stable/c/eb9327af3621d26b1d83f767c97a3fe8191a3a65
https://git.kernel.org/stable/c/ff28893c96c5e0927a4da10cd24a3522ca663515
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

OVAL    9
oval:org.secpod.oval:def:708997
oval:org.secpod.oval:def:709005
oval:org.secpod.oval:def:708995
oval:org.secpod.oval:def:709006
...
XCCDF    1

© SecPod Technologies