vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-50156): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Nov 7, 2024 | Feb 20, 2025 | May 27, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/msm: Avoid NULL dereference in msm_disp_state_print_regs()
If the allocation in msm_disp_state_dump_regs() failed then
`block->state` can be NULL. The msm_disp_state_print_regs() function
_does_ have code to try to handle it with:
if (*reg)
dump_addr = *reg;
...but since "dump_addr" is initialized to NULL the above is actually
a noop. The code then goes on to dereference `dump_addr`.
Make the function print "Registers not stored" when it sees a NULL to
solve this. Since we're touching the code, fix
msm_disp_state_print_regs() not to pointlessly take a double-pointer
and properly mark the pointer as `const`.
Patchwork: https://patchwork.freedesktop.org/patch/619657/
Solution(s)
References
- CVE-2024-50156
- https://attackerkb.com/topics/CVE-2024-50156
- UBUNTU-USN-7276-1
- UBUNTU-USN-7277-1
- UBUNTU-USN-7288-1
- UBUNTU-USN-7288-2
- UBUNTU-USN-7289-1
- UBUNTU-USN-7289-2
- UBUNTU-USN-7289-3
- UBUNTU-USN-7289-4
- UBUNTU-USN-7291-1
- UBUNTU-USN-7305-1
- UBUNTU-USN-7308-1
- UBUNTU-USN-7310-1
- UBUNTU-USN-7331-1
- UBUNTU-USN-7388-1
- UBUNTU-USN-7389-1
- UBUNTU-USN-7390-1
- UBUNTU-USN-7449-1
- UBUNTU-USN-7449-2
- UBUNTU-USN-7450-1
- UBUNTU-USN-7451-1
- UBUNTU-USN-7452-1
- UBUNTU-USN-7453-1
- UBUNTU-USN-7458-1
- UBUNTU-USN-7468-1
- UBUNTU-USN-7523-1
- UBUNTU-USN-7524-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.