CVE-2024-41089

In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes In nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a possible NULL pointer dereference on failure of drm_mode_duplicate(). The same applies to drm_cvt_mode(). Add a check to avoid null pointer dereference.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Aug 2024, 17:50

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/nouveau/dispnv04: corrige la desreferencia del puntero nulo en nv17_tv_get_hd_modes En nv17_tv_get_hd_modes(), el valor de retorno de drm_mode_duplicate() se asigna al modo, lo que conducirá a una posible desreferencia del puntero NULL en caso de falla de drm_mode_duplicate(). Lo mismo se aplica a drm_cvt_mode(). Agregue una marca para evitar la desreferencia del puntero nulo.
References () https://git.kernel.org/stable/c/1c9f2e60150b4f13789064370e37f39e6e060f50 - () https://git.kernel.org/stable/c/1c9f2e60150b4f13789064370e37f39e6e060f50 - Patch
References () https://git.kernel.org/stable/c/30cbf6ffafbbdd8a6e4e5f0a2e9a9827ee83f3ad - () https://git.kernel.org/stable/c/30cbf6ffafbbdd8a6e4e5f0a2e9a9827ee83f3ad - Patch
References () https://git.kernel.org/stable/c/56fc4d3b0bdef691831cd95715a7ca3ebea98b2d - () https://git.kernel.org/stable/c/56fc4d3b0bdef691831cd95715a7ca3ebea98b2d - Patch
References () https://git.kernel.org/stable/c/5eecb49a6c268dc229005bf6e8167d4001dc09a0 - () https://git.kernel.org/stable/c/5eecb49a6c268dc229005bf6e8167d4001dc09a0 - Patch
References () https://git.kernel.org/stable/c/6d411c8ccc0137a612e0044489030a194ff5c843 - () https://git.kernel.org/stable/c/6d411c8ccc0137a612e0044489030a194ff5c843 - Patch
References () https://git.kernel.org/stable/c/6e49a157d541e7e97b815a56f4bdfcbc89844a59 - () https://git.kernel.org/stable/c/6e49a157d541e7e97b815a56f4bdfcbc89844a59 - Patch
References () https://git.kernel.org/stable/c/7ece609b0ce7a7ea8acdf512a77d1fee26621637 - () https://git.kernel.org/stable/c/7ece609b0ce7a7ea8acdf512a77d1fee26621637 - Patch
References () https://git.kernel.org/stable/c/ffabad4aa91e33ced3c6ae793fb37771b3e9cb51 - () https://git.kernel.org/stable/c/ffabad4aa91e33ced3c6ae793fb37771b3e9cb51 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-476

29 Jul 2024, 16:21

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 16:15

Updated : 2024-08-08 17:50


NVD link : CVE-2024-41089

Mitre link : CVE-2024-41089

CVE.ORG link : CVE-2024-41089


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference