dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Linux
Subscribe
|
Linux Kernel
Subscribe
|
|
Netapp
Subscribe
|
H300e
Subscribe
H300e Firmware
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410c
Subscribe
H410c Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500e
Subscribe
H500e Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700e
Subscribe
H700e Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-5165-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5265-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5362-1 | Linux kernel (Intel IOTG) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T03:30:38.271Z
Reserved: 2021-10-12T00:00:00
Link: CVE-2021-42327
No data.
Status : Modified
Published: 2021-10-21T17:15:07.913
Modified: 2024-11-21T06:27:36.903
Link: CVE-2021-42327
OpenCVE Enrichment
No data.
Ubuntu USN