Description
In the Linux kernel, the following vulnerability has been resolved: drm: nv04: Fix out of bounds access When Output Resource (dcb->or) value is assigned in fabricate_dcb_output(), there may be out of bounds access to dac_users array in case dcb->or is zero because ffs(dcb->or) is used as index there. The 'or' argument of fabricate_dcb_output() must be interpreted as a number of bit to set, not value. Utilize macros from 'enum nouveau_or' in calls instead of hardcoding. Found by Linux Verification Center (linuxtesting.org) with SVACE.
References (13)
Core 13
Core References
Mailing List, Patch
https://git.kernel.org/stable/c/097c7918fcfa1dee233acfd1f3029f00c3bc8062
Mailing List, Patch
https://git.kernel.org/stable/c/26212da39ee14a52c76a202c6ae5153a84f579a5
Mailing List, Patch
https://git.kernel.org/stable/c/5050ae879a828d752b439e3827aac126709da6d1
Mailing List, Patch
https://git.kernel.org/stable/c/5fd4b090304e450aa0e7cc9cc2b4873285c6face
Mailing List, Patch
https://git.kernel.org/stable/c/6690cc2732e2a8d0eaca44dcbac032a4b0148042
Mailing List, Patch
https://git.kernel.org/stable/c/c2b97f26f081ceec3298151481687071075a25cb
Mailing List, Patch
https://git.kernel.org/stable/c/cf92bb778eda7830e79452c6917efa8474a30c1e
Mailing List, Patch
https://git.kernel.org/stable/c/df0991da7db846f7fa4ec6740350f743d3b69b04
Mailing List, Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Mailing List, Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
2.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (13)
debian/debian_linux
10.0
fedoraproject/fedora
38
fedoraproject/fedora
39
fedoraproject/fedora
40
linux/Kernel
2.6.38 - 4.19.313linux
linux/Kernel
4.20.0 - 5.4.275linux
linux/Kernel
5.11.0 - 5.15.157linux
linux/Kernel
5.16.0 - 6.1.88linux
linux/Kernel
5.5.0 - 5.10.216linux
linux/Kernel
6.2.0 - 6.6.29linux
... and 3 more
Published
May 01, 2024
Tracked Since
Feb 18, 2026