๐Ÿ” CVE Alert

CVE-2024-50117

MEDIUM 5.5

drm/amd: Guard against bad data for ATIF ACPI method

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/amd: Guard against bad data for ATIF ACPI method If a BIOS provides bad data in response to an ATIF method call this causes a NULL pointer dereference in the caller. ``` ? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1)) ? __die (arch/x86/kernel/dumpstack.c:423 arch/x86/kernel/dumpstack.c:434) ? page_fault_oops (arch/x86/mm/fault.c:544 (discriminator 2) arch/x86/mm/fault.c:705 (discriminator 2)) ? do_user_addr_fault (arch/x86/mm/fault.c:440 (discriminator 1) arch/x86/mm/fault.c:1232 (discriminator 1)) ? acpi_ut_update_object_reference (drivers/acpi/acpica/utdelete.c:642) ? exc_page_fault (arch/x86/mm/fault.c:1542) ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623) ? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:387 (discriminator 2)) amdgpu ? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:386 (discriminator 1)) amdgpu ``` It has been encountered on at least one system, so guard for it. (cherry picked from commit c9b7c809b89f24e9372a4e7f02d64c950b07fdee)

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 5, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d38ceaf99ed015f2a0b9af3499791bd3a3daae21 < 58556dcbd5606a5daccaee73b2130bc16b48e025 d38ceaf99ed015f2a0b9af3499791bd3a3daae21 < 43b4fa6e0e238c6e2662f4fb61d9f51c2785fb1d d38ceaf99ed015f2a0b9af3499791bd3a3daae21 < 234682910971732cd4da96fd95946e296e486b38 d38ceaf99ed015f2a0b9af3499791bd3a3daae21 < 6032287747f874b52dc8b9d7490e2799736e035f d38ceaf99ed015f2a0b9af3499791bd3a3daae21 < cd67af3c1762de4c2483ae4dbdd98f9ea8fa56e3 d38ceaf99ed015f2a0b9af3499791bd3a3daae21 < 975ede2a7bec52b5da1428829b3439667c8a234b d38ceaf99ed015f2a0b9af3499791bd3a3daae21 < 1d7175f9c57b1abf9ecfbdfd53ea760761f52ffe d38ceaf99ed015f2a0b9af3499791bd3a3daae21 < bf58f03931fdcf7b3c45cb76ac13244477a60f44
Linux / Linux
4.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/58556dcbd5606a5daccaee73b2130bc16b48e025 git.kernel.org: https://git.kernel.org/stable/c/43b4fa6e0e238c6e2662f4fb61d9f51c2785fb1d git.kernel.org: https://git.kernel.org/stable/c/234682910971732cd4da96fd95946e296e486b38 git.kernel.org: https://git.kernel.org/stable/c/6032287747f874b52dc8b9d7490e2799736e035f git.kernel.org: https://git.kernel.org/stable/c/cd67af3c1762de4c2483ae4dbdd98f9ea8fa56e3 git.kernel.org: https://git.kernel.org/stable/c/975ede2a7bec52b5da1428829b3439667c8a234b git.kernel.org: https://git.kernel.org/stable/c/1d7175f9c57b1abf9ecfbdfd53ea760761f52ffe git.kernel.org: https://git.kernel.org/stable/c/bf58f03931fdcf7b3c45cb76ac13244477a60f44 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html