SB20241022202 - Integer overflow in Linux kernel display dc driver
Published: October 22, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Integer overflow (CVE-ID: CVE-2024-50016)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to integer overflow within the dp_set_test_pattern() function in drivers/gpu/drm/amd/display/dc/link/accessories/link_dp_cts.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/a1495acc6234fa79b775599d3f49009afd53299f
- https://git.kernel.org/stable/c/26ced9d86240868f5b41708ceee02e6ec2924498
- https://git.kernel.org/stable/c/adeed800bc30ef718478b28c08f79231e5980e3d
- https://git.kernel.org/stable/c/a15268787b79fd183dd526cc16bec9af4f4e49a1
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.14
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.55