Description
In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Do not return negative stream id for array

[WHY]
resource_stream_to_stream_idx returns an array index and it return -1
when not found; however, -1 is not a valid array index number.

[HOW]
When this happens, call ASSERT(), and return a zero instead.

This fixes an OVERRUN and an NEGATIVE_RETURNS issues reported by Coverity.
Published: 2024-07-30
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-7089-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7089-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7089-3 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7089-4 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7089-5 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7089-6 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7089-7 Linux kernel (Low Latency) vulnerabilities
Ubuntu USN Ubuntu USN USN-7090-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7095-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7156-1 Linux kernel (GKE) vulnerabilities
History

Mon, 29 Sep 2025 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 05 Nov 2024 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Sep 2024 08:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 Aug 2024 02:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H'}


Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T20:27:20.115Z

Reserved: 2024-07-29T15:50:41.178Z

Link: CVE-2024-42118

cve-icon Vulnrichment

Updated: 2024-08-02T04:54:32.598Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-30T08:15:04.097

Modified: 2025-09-29T14:57:08.527

Link: CVE-2024-42118

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-07-30T00:00:00Z

Links: CVE-2024-42118 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T23:06:12Z

Weaknesses