NULL pointer dereference in Linux kernel dc core driver



| Updated: 2025-05-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-49896
CWE-ID CWE-476
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) NULL pointer dereference

EUVDB-ID: #VU98962

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49896

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the are_stream_backends_same() function in drivers/gpu/drm/amd/display/dc/core/dc_resource.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.19 - 6.11.2

CPE2.3 External links

https://git.kernel.org/stable/c/0167d570f6a0b38689c4a0e50bf79c518d827500
https://git.kernel.org/stable/c/14db8692afe1aa2143b673856bb603713d8ea93f
https://git.kernel.org/stable/c/e8da54b7f8a17e44e67ea6d1037f35450af28115
https://git.kernel.org/stable/c/42d31a33643813cce55ee1ebbad3a2d0d24a08e0
https://git.kernel.org/stable/c/5b4b13e678b15975055f4ff1ce4cf0ce4c19b6c4
https://git.kernel.org/stable/c/e41a291e1bef1153bba091b6580ecc7affc53c82
https://git.kernel.org/stable/c/35ff747c86767937ee1e0ca987545b7eed7a0810
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.323
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.227
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.168
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.285
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.113
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.10.14
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.11.3
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.55


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###