CVE-2024-57887
Published: January 16, 2025Last modified: January 16, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: drm: adv7511: Fix use-after-free in adv7533_attach_dsi() The host_node pointer was assigned and freed in adv7533_parse_dt(), and later, adv7533_attach_dsi() uses the same. Fix this use-after-free issue by dropping of_node_put() in adv7533_parse_dt() and calling of_node_put() in error path of probe() and also in the remove().
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.127-r0) |
Stream | linux-lts | Fixed (6.6.70-r0) |
References
- https://git.kernel.org/stable/c/1f49aaf55652580ae63ab83d67211fe6a55d83dc
- https://git.kernel.org/stable/c/81adbd3ff21c1182e06aa02c6be0bfd9ea02d8e8
- https://git.kernel.org/stable/c/acec80d9f126cd3fa764bbe3d96bc0cb5cd2b087
- https://git.kernel.org/stable/c/ca9d077350fa21897de8bf64cba23b198740aab5
- https://git.kernel.org/stable/c/d208571943ffddc438a7ce533d5d0b9219806242