Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes In nouveau_connector_get_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a possible NULL pointer dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.33, < 4.19.318 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/1f32535238493008587a8c5cb17eb2ca097592efPatch
- https://git.kernel.org/stable/c/274cba8d2d1b48c72d8bd90e76c9e2dc1aa0a81dPatch
- https://git.kernel.org/stable/c/744b229f09134ccd091427a6f9ea6d97302cfdd9Patch
- https://git.kernel.org/stable/c/7db5411c5d0bd9c29b8c2ad93c36b5c16ea46c9ePatch
- https://git.kernel.org/stable/c/80bec6825b19d95ccdfd3393cf8ec15ff2a749b4Patch
- https://git.kernel.org/stable/c/9baf60323efa992b7c915094529f0a1882c34e7ePatch
- https://git.kernel.org/stable/c/e36364f5f3785d054a94e57e971385284886d41aPatch
- https://git.kernel.org/stable/c/f48dd3f19614022f2e1b794fbd169d2b4c398c07Patch
- https://git.kernel.org/stable/c/1f32535238493008587a8c5cb17eb2ca097592efPatch
- https://git.kernel.org/stable/c/274cba8d2d1b48c72d8bd90e76c9e2dc1aa0a81dPatch
- https://git.kernel.org/stable/c/744b229f09134ccd091427a6f9ea6d97302cfdd9Patch
- https://git.kernel.org/stable/c/7db5411c5d0bd9c29b8c2ad93c36b5c16ea46c9ePatch
- https://git.kernel.org/stable/c/80bec6825b19d95ccdfd3393cf8ec15ff2a749b4Patch
- https://git.kernel.org/stable/c/9baf60323efa992b7c915094529f0a1882c34e7ePatch
- https://git.kernel.org/stable/c/e36364f5f3785d054a94e57e971385284886d41aPatch
FAQ
What is CVE-2024-42101?
CVE-2024-42101 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes In nouveau_connector_get_modes(), the return value of drm...
How severe is CVE-2024-42101?
CVE-2024-42101 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-42101?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.