Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Adding array index check to prevent memory corruption [Why & How] Array indices out of bound caused memory corruption. Adding checks to ensure that array index stays in bound.

PUBLISHED Reserved 2024-12-29 | Published 2025-01-08 | Updated 2025-10-01 | Assigner Linux

Product status

Default status
unaffected

0057b36ac2be0f573048acda52e641e0502a9ff3 (git) before dff526dc3e27f5484f5ba11471b9fbbe681467f2
affected

0057b36ac2be0f573048acda52e641e0502a9ff3 (git) before 2c437d9a0b496168e1a1defd17b531f0a526dbe9
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

6.12.5 (semver)
unaffected

6.13 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/dff526dc3e27f5484f5ba11471b9fbbe681467f2

git.kernel.org/...c/2c437d9a0b496168e1a1defd17b531f0a526dbe9

cve.org (CVE-2024-56784)

nvd.nist.gov (CVE-2024-56784)

Download JSON