CVE-2024-27008

7.8 HIGH
Published: May 01, 2024 Modified: December 01, 2025

Description

In the Linux kernel, the following vulnerability has been resolved: drm: nv04: Fix out of bounds access When Output Resource (dcb->or) value is assigned in fabricate_dcb_output(), there may be out of bounds access to dac_users array in case dcb->or is zero because ffs(dcb->or) is used as index there. The 'or' argument of fabricate_dcb_output() must be interpreted as a number of bit to set, not value. Utilize macros from 'enum nouveau_or' in calls instead of hardcoding. Found by Linux Verification Center (linuxtesting.org) with SVACE.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://git.kernel.org/stable/c/097c7918fcfa1dee233acfd1f3029f00c3bc8062
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/26212da39ee14a52c76a202c6ae5153a84f579a5
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/5050ae879a828d752b439e3827aac126709da6d1
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/5fd4b090304e450aa0e7cc9cc2b4873285c6face
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/6690cc2732e2a8d0eaca44dcbac032a4b0148042
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/c2b97f26f081ceec3298151481687071075a25cb
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/cf92bb778eda7830e79452c6917efa8474a30c1e
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/df0991da7db846f7fa4ec6740350f743d3b69b04
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/097c7918fcfa1dee233acfd1f3029f00c3bc8062
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/26212da39ee14a52c76a202c6ae5153a84f579a5
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/5050ae879a828d752b439e3827aac126709da6d1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/5fd4b090304e450aa0e7cc9cc2b4873285c6face
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/6690cc2732e2a8d0eaca44dcbac032a4b0148042
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/c2b97f26f081ceec3298151481687071075a25cb
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/cf92bb778eda7830e79452c6917efa8474a30c1e
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://git.kernel.org/stable/c/df0991da7db846f7fa4ec6740350f743d3b69b04
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory

21 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
0.0%
1th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

fedoraproject debian linux