In the Linux kernel, the following vulnerability has been resolved: fbdev: omapfb: Add 'plane' value check Function dispc_ovl_setup is not intended to work with the value OMAP_DSS_WB of the enum parameter plane. The value of this parameter is initialized in dss_init_overlays and in the current state of the code it cannot take this value so it's not a real problem. For the purposes of defensive coding it wouldn't be superfluous to check the parameter value, because some functions down the call stack process this value correctly and some not. For example, in dispc_ovl_setup_global_alpha it may lead to buffer overflow. Add check for this value. Found by Linux Verification Center (linuxtesting.org) with SVACE static analysis tool.
https://git.kernel.org/stable/c/fda15c5b96b883d62fb2d84a3a1422aa87717897
https://git.kernel.org/stable/c/cdf41d72e8b015d9ea68f5a1c0a79624e7c312aa
https://git.kernel.org/stable/c/a570efb4d877adbf3db2dc95487f2ba6bfdd148a
https://git.kernel.org/stable/c/9b0a41589ee70529b20e1e0108d03f10c649bdc4
https://git.kernel.org/stable/c/660a53a0694d1f3789802509fe729dd4656fc5e0
https://git.kernel.org/stable/c/52eafaa56f8f6d6a0cdff9282b25b4acbde34edc
https://git.kernel.org/stable/c/4efd8ef5e40f2c7a4a91a5a9f03140bfa827da89
https://git.kernel.org/stable/c/3e411827f31db7f938a30a3c7a7599839401ec30
https://git.kernel.org/stable/c/09dbf22fd68c2f1a81ab89670ffa1ec3033436c4