First published: Wed Jan 08 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix handling of plane refcount [Why] The mechanism to backup and restore plane states doesn't maintain refcount, which can cause issues if the refcount of the plane changes in between backup and restore operations, such as memory leaks if the refcount was supposed to go down, or double frees / invalid memory accesses if the refcount was supposed to go up. [How] Cache and re-apply current refcount when restoring plane states.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.12.4 | |
debian/linux | <=5.10.223-1<=5.10.234-1<=6.1.129-1<=6.1.128-1 | 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56775 has been classified as a high severity vulnerability affecting the Linux kernel.
To fix CVE-2024-56775, upgrade to the latest version of the Linux kernel that addresses this vulnerability.
CVE-2024-56775 affects Linux kernel versions prior to 6.12.4.
CVE-2024-56775 impacts the drm/amd/display subsystem of the Linux kernel.
The potential consequences of CVE-2024-56775 include instability or crashes due to improper handling of plane reference counts.