CVE-2024-41060

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: check bo_va->bo is non-NULL before using it The call to radeon_vm_clear_freed might clear bo_va->bo, so we have to check it before dereferencing it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*

History

21 Nov 2024, 09:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/6fb15dcbcf4f212930350eaee174bb60ed40a536 - Patch () https://git.kernel.org/stable/c/6fb15dcbcf4f212930350eaee174bb60ed40a536 - Patch
References () https://git.kernel.org/stable/c/8a500b3a5f0a58c6f99039091fbd715f64f2f8af - Patch () https://git.kernel.org/stable/c/8a500b3a5f0a58c6f99039091fbd715f64f2f8af - Patch
References () https://git.kernel.org/stable/c/a2b201f83971df03c8e81a480b2f2846ae8ce1a3 - Patch () https://git.kernel.org/stable/c/a2b201f83971df03c8e81a480b2f2846ae8ce1a3 - Patch
References () https://git.kernel.org/stable/c/a9100f17428cb733c4f6fbb132d98bed76318342 - Patch () https://git.kernel.org/stable/c/a9100f17428cb733c4f6fbb132d98bed76318342 - Patch
References () https://git.kernel.org/stable/c/f13c96e0e325a057c03f8a47734adb360e112efe - Patch () https://git.kernel.org/stable/c/f13c96e0e325a057c03f8a47734adb360e112efe - Patch

10 Sep 2024, 17:23

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/6fb15dcbcf4f212930350eaee174bb60ed40a536 - () https://git.kernel.org/stable/c/6fb15dcbcf4f212930350eaee174bb60ed40a536 - Patch
References () https://git.kernel.org/stable/c/8a500b3a5f0a58c6f99039091fbd715f64f2f8af - () https://git.kernel.org/stable/c/8a500b3a5f0a58c6f99039091fbd715f64f2f8af - Patch
References () https://git.kernel.org/stable/c/a2b201f83971df03c8e81a480b2f2846ae8ce1a3 - () https://git.kernel.org/stable/c/a2b201f83971df03c8e81a480b2f2846ae8ce1a3 - Patch
References () https://git.kernel.org/stable/c/a9100f17428cb733c4f6fbb132d98bed76318342 - () https://git.kernel.org/stable/c/a9100f17428cb733c4f6fbb132d98bed76318342 - Patch
References () https://git.kernel.org/stable/c/f13c96e0e325a057c03f8a47734adb360e112efe - () https://git.kernel.org/stable/c/f13c96e0e325a057c03f8a47734adb360e112efe - Patch
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/radeon: verifique que bo_va->bo no sea NULL antes de usarlo. La llamada a radeon_vm_clear_freed podría borrar bo_va->bo, por lo que debemos verificarlo antes de eliminar la referencia.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

29 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 15:15

Updated : 2024-11-21 09:32


NVD link : CVE-2024-41060

Mitre link : CVE-2024-41060

CVE.ORG link : CVE-2024-41060


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference