🔐 CVE Alert

CVE-2024-57887

HIGH 7.8

drm: adv7511: Fix use-after-free in adv7533_attach_dsi()

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm: adv7511: Fix use-after-free in adv7533_attach_dsi() The host_node pointer was assigned and freed in adv7533_parse_dt(), and later, adv7533_attach_dsi() uses the same. Fix this use-after-free issue by dropping of_node_put() in adv7533_parse_dt() and calling of_node_put() in error path of probe() and also in the remove().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 15, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Linux / Linux
1e4d58cd7f888522d16f221d628356befbb08468 < acec80d9f126cd3fa764bbe3d96bc0cb5cd2b087 1e4d58cd7f888522d16f221d628356befbb08468 < d208571943ffddc438a7ce533d5d0b9219806242 1e4d58cd7f888522d16f221d628356befbb08468 < 1f49aaf55652580ae63ab83d67211fe6a55d83dc 1e4d58cd7f888522d16f221d628356befbb08468 < ca9d077350fa21897de8bf64cba23b198740aab5 1e4d58cd7f888522d16f221d628356befbb08468 < 81adbd3ff21c1182e06aa02c6be0bfd9ea02d8e8
Linux / Linux
4.8

References

NVD ↗ CVE.org ↗ EPSS Data ↗
git.kernel.org: https://git.kernel.org/stable/c/acec80d9f126cd3fa764bbe3d96bc0cb5cd2b087 git.kernel.org: https://git.kernel.org/stable/c/d208571943ffddc438a7ce533d5d0b9219806242 git.kernel.org: https://git.kernel.org/stable/c/1f49aaf55652580ae63ab83d67211fe6a55d83dc git.kernel.org: https://git.kernel.org/stable/c/ca9d077350fa21897de8bf64cba23b198740aab5 git.kernel.org: https://git.kernel.org/stable/c/81adbd3ff21c1182e06aa02c6be0bfd9ea02d8e8 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html