Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/sti: avoid potential dereference of error pointers The return value of drm_atomic_get_crtc_state() needs to be checked. To avoid use of error pointer 'crtc_state' in case of the failure.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.6, < 5.15.174 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/40725c5fabee804fecce41d4d5c5bae80c45e1c4Patch
- https://git.kernel.org/stable/c/831214f77037de02afc287eae93ce97f218d8c04Patch
- https://git.kernel.org/stable/c/8ab73ac97c0fa528f66eeccd9bb53eb6eb7d20dcPatch
- https://git.kernel.org/stable/c/e98ff67f5a68114804607de549c2350d27628fc7Patch
- https://git.kernel.org/stable/c/f67786293193cf01ebcc6fdbcbd1587b24f52679Patch
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
FAQ
What is CVE-2024-56776?
CVE-2024-56776 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: drm/sti: avoid potential dereference of error pointers The return value of drm_atomic_get_crtc_state() needs to be checked. To avo...
How severe is CVE-2024-56776?
CVE-2024-56776 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-56776?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.