In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix off by one in hdmi_14_process_transaction()
The hdcp_i2c_offsets[] array did not have an entry for
HDCP_MESSAGE_ID_WRITE_CONTENT_STREAM_TYPE so it led to an off by one
read overflow. I added an entry and copied the 0x0 value for the offset
from similar code in drivers/gpu/drm/amd/display/modules/hdcp/hdcp_ddc.c.
I also declared several of these arrays as having HDCP_MESSAGE_ID_MAX
entries. This doesn't change the code, but it's just a belt and
suspenders approach to try future proof the code.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-02-28T08:13:50.320Z
Updated: 2024-11-04T11:58:22.611Z
Reserved: 2024-02-27T18:42:55.970Z
Link: CVE-2021-47046
Vulnrichment
Updated: 2024-08-04T05:24:39.795Z
NVD
Status : Awaiting Analysis
Published: 2024-02-28T09:15:40.277
Modified: 2024-11-21T06:35:15.473
Link: CVE-2021-47046
Redhat