CVE-2024-53133

Source
https://cve.org/CVERecord?id=CVE-2024-53133
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53133.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53133
Downstream
Related
Published
2024-12-04T14:20:39.077Z
Modified
2026-03-20T12:40:45.869310Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
drm/amd/display: Handle dml allocation failure to avoid crash
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Handle dml allocation failure to avoid crash

[Why] In the case where a dml allocation fails for any reason, the current state's dml contexts would no longer be valid. Then subsequent calls dcstatecopy_internal would shallow copy invalid memory and if the new state was released, a double free would occur.

[How] Reset dml pointers in new_state to NULL and avoid invalid pointer

(cherry picked from commit bcafdc61529a48f6f06355d78eb41b3aeda5296c)

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53133.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
abd26a3252cbd1a3ae4e46d37596d176fe50b41a
Fixed
874ff59cde8fc525112dda26b501a1bac17dde9f
Fixed
6825cb07b79ffeb1d90ffaa7a1227462cdca34ae
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
2064f7529dfe0305d6fafda77fdf66701d428db5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53133.json"