Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()' Tell snprintf() to store at most 10 bytes in the output buffer instead of 30. Fixes the below: drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_debugfs.c:1508 dp_dsc_clock_en_read() error: snprintf() is printing too much 30 vs 10
References (8)
Core 8
Core References
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
3.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-120
Status
published
Products (7)
linux/Kernel
5.11.0 - 5.15.153linux
linux/Kernel
5.16.0 - 6.1.83linux
linux/Kernel
5.9.0 - 5.10.214linux
linux/Kernel
6.2.0 - 6.6.23linux
linux/Kernel
6.7.0 - 6.7.11linux
linux/Kernel
6.8.0 - 6.8.2linux
linux/linux_kernel
5.9 - 5.10.214
Published
May 01, 2024
Tracked Since
Feb 18, 2026