NULL Pointer Dereference Affecting kernel-syms package, versions <6.4.0-150600.23.14.2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES156-KERNELSYMS-7552786
- published 23 Jul 2024
- disclosed 22 Jul 2024
Introduced: 22 Jul 2024
CVE-2024-38390 Open this link in a new tabHow to fix?
Upgrade SLES:15.6
kernel-syms
to version 6.4.0-150600.23.14.2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-syms
package and not the kernel-syms
package as distributed by SLES
.
See How to fix?
for SLES:15.6
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails
Calling a6xx_destroy() before adreno_gpu_init() leads to a null pointer dereference on:
msm_gpu_cleanup() : platform_set_drvdata(gpu->pdev, NULL);
as gpu->pdev is only assigned in:
a6xx_gpu_init() |_ adreno_gpu_init |_ msm_gpu_init()
Instead of relying on handwavy null checks down the cleanup chain, explicitly de-allocate the LLC data and free a6xx_gpu instead.
References
- https://www.suse.com/security/cve/CVE-2024-38390.html
- https://bugzilla.suse.com/1226891
- https://git.kernel.org/stable/c/247849eeb3fd88f8990ed73e33af70d5c10f9aec
- https://git.kernel.org/stable/c/46d4efcccc688cbacdd70a238bedca510acaa8e4
- https://git.kernel.org/stable/c/617e3d1680504a3f9d88e1582892c68be155498f
- https://git.kernel.org/stable/c/a1955a6df91355fef72a3a254700acd3cc1fec0d