We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-49901

drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs



Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs There are some cases, such as the one uncovered by Commit 46d4efcccc68 ("drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails") where msm_gpu_cleanup() : platform_set_drvdata(gpu->pdev, NULL); is called on gpu->pdev == NULL, as the GPU device has not been fully initialized yet. Turns out that there's more than just the aforementioned path that causes this to happen (e.g. the case when there's speedbin data in the catalog, but opp-supported-hw is missing in DT). Assigning msm_gpu->pdev earlier seems like the least painful solution to this, therefore do so. Patchwork: https://patchwork.freedesktop.org/patch/602742/

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 9288a9676c529ad9c856096db68fad812499bc4a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 9773737375b20070ea935203fd66cb9fa17c5acb
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e8ac2060597a5768e4699bb61d604b4c09927b85
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 16007768551d5bfe53426645401435ca8d2ef54f
affected

Default status
affected

6.6.55
unaffected

6.10.14
unaffected

6.11.3
unaffected

6.12
unaffected

References

git.kernel.org/...c/9288a9676c529ad9c856096db68fad812499bc4a

git.kernel.org/...c/9773737375b20070ea935203fd66cb9fa17c5acb

git.kernel.org/...c/e8ac2060597a5768e4699bb61d604b4c09927b85

git.kernel.org/...c/16007768551d5bfe53426645401435ca8d2ef54f

cve.org (CVE-2024-49901)

nvd.nist.gov (CVE-2024-49901)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-49901

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.