CVE-2024-26767NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 99.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 3
Latest updateApr 9

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fixed integer types and null check locations [why]: issues fixed: - comparison with wider integer type in loop condition which can cause infinite loops - pointer dereference before null check

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages6 packages

NVDlinux/linux_kernel6.76.7.7+2
Debianlinux/linux_kernel< 6.1.133-1+2
CVEListV5linux/linux7ef414375fcc001b6d0745d2931d91c9c736e18d070fda699dfdce560755379bc428d9edada7a54e+4
debiandebian/linux< linux 6.1.133-1 (bookworm)
debiandebian/linux-6.1< linux 6.1.133-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-vxmc-w576-mqxx: In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fixed integer types and null check locations [why]: issues fixe2024-04-03
OSV
CVE-2024-26767: In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fixed integer types and null check locations [why]: issues fixed:2024-04-03

📋Vendor Advisories

3
Microsoft
drm/amd/display: fixed integer types and null check locations2024-04-09
Red Hat
kernel: drm/amd/display: fixed integer types and null check locations2024-04-03
Debian
CVE-2024-26767: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis...2024

💬Community

1
Bugzilla
CVE-2024-26767 kernel: drm/amd/display: fixed integer types and null check locations2024-04-03