CVE-2024-56777
Published: January 13, 2025Last modified: January 13, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check The return value of drm_atomic_get_crtc_state() needs to be checked. To avoid use of error pointer 'crtc_state' in case of the failure.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.120-r0) |
Stream | linux-lts | Fixed (6.6.64-r0) |
References
- https://git.kernel.org/stable/c/3cf2e7c448e246f7e700c7aa47450d1e27579559
- https://git.kernel.org/stable/c/997b64c3f4c1827c5cfda8ae7f5d13f78d28b541
- https://git.kernel.org/stable/c/b79612ed6bc1a184c45427105c851b5b2d4342ca
- https://git.kernel.org/stable/c/e965e771b069421c233d674c3c8cd8c7f7245f42
- https://git.kernel.org/stable/c/f5804567cf9605d6e5ec46c0bb786f7d50f18c13