CVE-2024-50201

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix encoder->possible_clones Include the encoder itself in its possible_clones bitmask. In the past nothing validated that drivers were populating possible_clones correctly, but that changed in commit 74d2aacbe840 ("drm: Validate encoder->possible_clones"). Looks like radeon never got the memo and is still not following the rules 100% correctly. This results in some warnings during driver initialization: Bogus possible_clones: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7) WARNING: CPU: 0 PID: 170 at drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c ... (cherry picked from commit 3b6e7d40649c0d75572039aff9d0911864c689db)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*

History

19 Nov 2024, 16:08

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1a235af0216411a32ab4db54f7bd19020b46c86d - () https://git.kernel.org/stable/c/1a235af0216411a32ab4db54f7bd19020b46c86d - Patch
References () https://git.kernel.org/stable/c/28127dba64d8ae1a0b737b973d6d029908599611 - () https://git.kernel.org/stable/c/28127dba64d8ae1a0b737b973d6d029908599611 - Patch
References () https://git.kernel.org/stable/c/68801730ebb9393460b30cd3885e407f15da27a9 - () https://git.kernel.org/stable/c/68801730ebb9393460b30cd3885e407f15da27a9 - Patch
References () https://git.kernel.org/stable/c/c3cd27d85f0778f4ec07384d7516b33153759b8e - () https://git.kernel.org/stable/c/c3cd27d85f0778f4ec07384d7516b33153759b8e - Patch
References () https://git.kernel.org/stable/c/df75c78bfeff99f9b4815c3e79e2b1b1e34fe264 - () https://git.kernel.org/stable/c/df75c78bfeff99f9b4815c3e79e2b1b1e34fe264 - Patch
References () https://git.kernel.org/stable/c/fda5dc80121b12871dc343ab37e0c3f0d138825d - () https://git.kernel.org/stable/c/fda5dc80121b12871dc343ab37e0c3f0d138825d - Patch

08 Nov 2024, 19:01

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/radeon: Fix encoder->possible_clones Incluir el codificador en sí mismo en su máscara de bits possible_clones. En el pasado, nada validaba que los controladores estuvieran completando possible_clones correctamente, pero eso cambió en el commit 74d2aacbe840 ("drm: Validate encoder->possible_clones"). Parece que Radeon nunca recibió la nota y todavía no sigue las reglas correctamente al 100%. Esto genera algunas advertencias durante la inicialización del controlador: Possible_clones falsos: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7) ADVERTENCIA: CPU: 0 PID: 170 en drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c ... (seleccionado de el commit 3b6e7d40649c0d75572039aff9d0911864c689db)

08 Nov 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-08 06:15

Updated : 2024-11-19 16:08


NVD link : CVE-2024-50201

Mitre link : CVE-2024-50201

CVE.ORG link : CVE-2024-50201


JSON object : View

Products Affected

linux

  • linux_kernel