First published: Fri Nov 08 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix encoder->possible_clones Include the encoder itself in its possible_clones bitmask. In the past nothing validated that drivers were populating possible_clones correctly, but that changed in commit 74d2aacbe840 ("drm: Validate encoder->possible_clones"). Looks like radeon never got the memo and is still not following the rules 100% correctly. This results in some warnings during driver initialization: Bogus possible_clones: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7) WARNING: CPU: 0 PID: 170 at drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c ... (cherry picked from commit 3b6e7d40649c0d75572039aff9d0911864c689db)
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.8<5.10.228 | |
Linux Kernel | >=5.11<5.15.169 | |
Linux Kernel | >=5.16<6.1.114 | |
Linux Kernel | >=6.2<6.6.58 | |
Linux Kernel | >=6.7<6.11.5 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50201 is considered to be of moderate severity due to its impact on the Linux kernel's handling of encoder configurations.
To fix CVE-2024-50201, update your Linux kernel to a version that addresses this vulnerability, specifically above the patched version.
CVE-2024-50201 affects Linux kernel versions between 5.8 and 6.12-rc3.
CVE-2024-50201 could potentially be exploited in scenarios where incorrect encoder configurations might lead to security issues.
CVE-2024-50201 primarily impacts the correctness of device driver interactions rather than system performance.