{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-26660","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-19T14:20:24.147Z","datePublished":"2024-04-02T06:22:10.263Z","dateUpdated":"2025-05-04T08:53:20.032Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T08:53:20.032Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Implement bounds check for stream encoder creation in DCN301\n\n'stream_enc_regs' array is an array of dcn10_stream_enc_registers\nstructures. The array is initialized with four elements, corresponding\nto the four calls to stream_enc_regs() in the array initializer. This\nmeans that valid indices for this array are 0, 1, 2, and 3.\n\nThe error message 'stream_enc_regs' 4 <= 5 below, is indicating that\nthere is an attempt to access this array with an index of 5, which is\nout of bounds. This could lead to undefined behavior\n\nHere, eng_id is used as an index to access the stream_enc_regs array. If\neng_id is 5, this would result in an out-of-bounds access on the\nstream_enc_regs array.\n\nThus fixing Buffer overflow error in dcn301_stream_encoder_create\nreported by Smatch:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: buffer overflow 'stream_enc_regs' 4 <= 5"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/gpu/drm/amd/display/dc/resource/dcn301/dcn301_resource.c"],"versions":[{"version":"3a83e4e64bb1522ddac67ffc787d1c38291e1a65","lessThan":"42442f74314d41ddc68227047036fa3e78940054","status":"affected","versionType":"git"},{"version":"3a83e4e64bb1522ddac67ffc787d1c38291e1a65","lessThan":"efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a","status":"affected","versionType":"git"},{"version":"3a83e4e64bb1522ddac67ffc787d1c38291e1a65","lessThan":"cd9bd10c59e3c1446680514fd3097c5b00d3712d","status":"affected","versionType":"git"},{"version":"3a83e4e64bb1522ddac67ffc787d1c38291e1a65","lessThan":"a938eab9586eea31cfd129a507f552efae14d738","status":"affected","versionType":"git"},{"version":"3a83e4e64bb1522ddac67ffc787d1c38291e1a65","lessThan":"58fca355ad37dcb5f785d9095db5f748b79c5dc2","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/gpu/drm/amd/display/dc/resource/dcn301/dcn301_resource.c"],"versions":[{"version":"5.11","status":"affected"},{"version":"0","lessThan":"5.11","status":"unaffected","versionType":"semver"},{"version":"5.15.149","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.78","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.17","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.5","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.149"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"6.1.78"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"6.6.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"6.7.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"6.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054"},{"url":"https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a"},{"url":"https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d"},{"url":"https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738"},{"url":"https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2"}],"title":"drm/amd/display: Implement bounds check for stream encoder creation in DCN301","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:14:12.621Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-26660","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T15:53:49.854571Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:32:57.286Z"}}]}}