We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50048

fbcon: Fix a NULL pointer dereference issue in fbcon_putcs



Description

In the Linux kernel, the following vulnerability has been resolved: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs syzbot has found a NULL pointer dereference bug in fbcon. Here is the simplified C reproducer: struct param { uint8_t type; struct tiocl_selection ts; }; int main() { struct fb_con2fbmap con2fb; struct param param; int fd = open("/dev/fb1", 0, 0); con2fb.console = 0x19; con2fb.framebuffer = 0; ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb); param.type = 2; param.ts.xs = 0; param.ts.ys = 0; param.ts.xe = 0; param.ts.ye = 0; param.ts.sel_mode = 0; int fd1 = open("/dev/tty1", O_RDWR, 0); ioctl(fd1, TIOCLINUX, &param); con2fb.console = 1; con2fb.framebuffer = 0; ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb); return 0; } After calling ioctl(fd1, TIOCLINUX, &param), the subsequent ioctl(fd, FBIOPUT_CON2FBMAP, &con2fb) causes the kernel to follow a different execution path: set_con2fb_map -> con2fb_init_display -> fbcon_set_disp -> redraw_screen -> hide_cursor -> clear_selection -> highlight -> invert_screen -> do_update_region -> fbcon_putcs -> ops->putcs Since ops->putcs is a NULL pointer, this leads to a kernel panic. To prevent this, we need to call set_blitting_type() within set_con2fb_map() to properly initialize ops->putcs.

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8266ae6eafdcd5a3136592445ff4038bbc7ee80e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f7fb5dda555344529ce584ff7a28b109528d2f1b
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e5c2dba62996a3a6eeb34bd248b90fc69c5a6a1b
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 5b97eebcce1b4f3f07a71f635d6aa3af96c236e7
affected

Default status
affected

6.1.113
unaffected

6.6.57
unaffected

6.11.4
unaffected

6.12
unaffected

References

git.kernel.org/...c/8266ae6eafdcd5a3136592445ff4038bbc7ee80e

git.kernel.org/...c/f7fb5dda555344529ce584ff7a28b109528d2f1b

git.kernel.org/...c/e5c2dba62996a3a6eeb34bd248b90fc69c5a6a1b

git.kernel.org/...c/5b97eebcce1b4f3f07a71f635d6aa3af96c236e7

cve.org (CVE-2024-50048)

nvd.nist.gov (CVE-2024-50048)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50048

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.