In the Linux kernel, the following vulnerability has been resolved:
drm/admgpu: fix dereferencing null pointer context
When user space sets an invalid ta type, the pointer context will be empty.
So it need to check the pointer context before using it
References
Configurations
Configuration 1 (hide)
|
History
27 Aug 2024, 13:41
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/030ffd4d43b433bc6671d9ec34fc12c59220b95d - Patch | |
References | () https://git.kernel.org/stable/c/4fd52f7c2c11d330571c6bde06e5ea508ec25c9d - Patch | |
References | () https://git.kernel.org/stable/c/641dac64178ccdb9e45c92b67120316896294d05 - Patch | |
CWE | CWE-476 |
26 Aug 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-26 11:15
Updated : 2024-08-27 13:41
NVD link : CVE-2024-43906
Mitre link : CVE-2024-43906
CVE.ORG link : CVE-2024-43906
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference