๐Ÿ” CVE Alert

CVE-2024-53060

MEDIUM 5.5

drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported acpi_evaluate_object() may return AE_NOT_FOUND (failure), which would result in dereferencing buffer.pointer (obj) while being NULL. Although this case may be unrealistic for the current code, it is still better to protect against possible bugs. Bail out also when status is AE_NOT_FOUND. This fixes 1 FORWARD_NULL issue reported by Coverity Report: CID 1600951: Null pointer dereferences (FORWARD_NULL) (cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 19, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
58556dcbd5606a5daccaee73b2130bc16b48e025 < ce8a00a00e36f61f5a1e47734332420b68784c43 43b4fa6e0e238c6e2662f4fb61d9f51c2785fb1d < 8d7a28eca7553d35d4ce192fa1f390f2357df41b 234682910971732cd4da96fd95946e296e486b38 < 2ac7f253deada4d449559b65a1c1cd0a6f6f19b7 6032287747f874b52dc8b9d7490e2799736e035f < 27fc29b5376998c126c85cf9b15d9dfc2afc9cbe cd67af3c1762de4c2483ae4dbdd98f9ea8fa56e3 < 1a9f55ed5b512f510ccd21ad527d532e60550e80 975ede2a7bec52b5da1428829b3439667c8a234b < a613a392417532ca5aaf3deac6e3277aa7aaef2b 1d7175f9c57b1abf9ecfbdfd53ea760761f52ffe < b9d9881237afeb52eddd70077b7174bf17e2fa30 bf58f03931fdcf7b3c45cb76ac13244477a60f44 < a6dd15981c03f2cdc9a351a278f09b5479d53d2e
Linux / Linux
4.19.323 < 4.19.324 5.4.285 < 5.4.286 5.10.229 < 5.10.230 5.15.170 < 5.15.172 6.1.115 < 6.1.117 6.6.59 < 6.6.61 6.11.6 < 6.11.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ce8a00a00e36f61f5a1e47734332420b68784c43 git.kernel.org: https://git.kernel.org/stable/c/8d7a28eca7553d35d4ce192fa1f390f2357df41b git.kernel.org: https://git.kernel.org/stable/c/2ac7f253deada4d449559b65a1c1cd0a6f6f19b7 git.kernel.org: https://git.kernel.org/stable/c/27fc29b5376998c126c85cf9b15d9dfc2afc9cbe git.kernel.org: https://git.kernel.org/stable/c/1a9f55ed5b512f510ccd21ad527d532e60550e80 git.kernel.org: https://git.kernel.org/stable/c/a613a392417532ca5aaf3deac6e3277aa7aaef2b git.kernel.org: https://git.kernel.org/stable/c/b9d9881237afeb52eddd70077b7174bf17e2fa30 git.kernel.org: https://git.kernel.org/stable/c/a6dd15981c03f2cdc9a351a278f09b5479d53d2e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html