APPLIED: [SRU][J][PATCH 0/1] CVE-2024-56608

Manuel Diewald manuel.diewald at canonical.com
Fri May 16 09:36:23 UTC 2025


On Wed, May 07, 2025 at 10:15:57AM +0200, Massimiliano Pellizzer wrote:
> https://ubuntu.com/security/CVE-2024-56608
> 
> [ Impact ]
> 
> drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
> 
> An issue was identified in the dcn21_link_encoder_create function where
> an out-of-bounds access could occur when the hpd_source index was used
> to reference the link_enc_hpd_regs array. This array has a fixed size
> and the index was not being checked against the array's bounds before
> accessing it.
> 
> This fix adds a conditional check to ensure that the hpd_source index is
> within the valid range of the link_enc_hpd_regs array. If the index is
> out of bounds, the function now returns NULL to prevent undefined
> behavior.
> 
> [ Fix ]
> 
> Oracular: Fixed via upstream stable updates (LP: #2096827)
> Noble: Fixed via upstream stable updates (LP: #2102118)
> Jammy: Cherry picked from mainline
> Focal: Not affected
> 
> [ Test Plan ]
> 
> Compiled tested only.
> 
> [ Where Problems Could Occur ]
> 
> A regression here is unlikely due to the very limited scope
> of the patch.
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team

Applied to jammy:linux/master-next--s2025.04.14-1. Thanks!

-- 
 Manuel
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20250516/190176ce/attachment.sig>


More information about the kernel-team mailing list