In the Linux kernel, the following vulnerability has been resolved:
drm: nv04: Fix out of bounds access
When Output Resource (dcb->or) value is assigned in
fabricate_dcb_output(), there may be out of bounds access to
dac_users array in case dcb->or is zero because ffs(dcb->or) is
used as index there.
The 'or' argument of fabricate_dcb_output() must be interpreted as a
number of bit to set, not value.
Utilize macros from 'enum nouveau_or' in calls instead of hardcoding.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
01 Dec 2025, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/[email protected]/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/[email protected]/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/[email protected]/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
|
| First Time |
Fedoraproject
Fedoraproject fedora |
04 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/097c7918fcfa1dee233acfd1f3029f00c3bc8062 - Mailing List, Patch | |
| References | () https://git.kernel.org/stable/c/26212da39ee14a52c76a202c6ae5153a84f579a5 - Mailing List, Patch | |
| References | () https://git.kernel.org/stable/c/5050ae879a828d752b439e3827aac126709da6d1 - Mailing List, Patch | |
| References | () https://git.kernel.org/stable/c/5fd4b090304e450aa0e7cc9cc2b4873285c6face - Mailing List, Patch | |
| References | () https://git.kernel.org/stable/c/6690cc2732e2a8d0eaca44dcbac032a4b0148042 - Mailing List, Patch | |
| References | () https://git.kernel.org/stable/c/c2b97f26f081ceec3298151481687071075a25cb - Mailing List, Patch | |
| References | () https://git.kernel.org/stable/c/cf92bb778eda7830e79452c6917efa8474a30c1e - Mailing List, Patch | |
| References | () https://git.kernel.org/stable/c/df0991da7db846f7fa4ec6740350f743d3b69b04 - Mailing List, Patch |
Information
Published : 2024-05-01 06:15
Updated : 2025-12-01 15:17
NVD link : CVE-2024-27008
Mitre link : CVE-2024-27008
CVE.ORG link : CVE-2024-27008
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
fedoraproject
- fedora
CWE
CWE-125
Out-of-bounds Read
