Executive Summary

Informations
Name CVE-2024-41089 First vendor Publication 2024-07-29
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes

In nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a possible NULL pointer dereference on failure of drm_mode_duplicate(). The same applies to drm_cvt_mode(). Add a check to avoid null pointer dereference.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41089

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3635

Sources (Detail)

https://git.kernel.org/stable/c/1c9f2e60150b4f13789064370e37f39e6e060f50
https://git.kernel.org/stable/c/30cbf6ffafbbdd8a6e4e5f0a2e9a9827ee83f3ad
https://git.kernel.org/stable/c/56fc4d3b0bdef691831cd95715a7ca3ebea98b2d
https://git.kernel.org/stable/c/5eecb49a6c268dc229005bf6e8167d4001dc09a0
https://git.kernel.org/stable/c/6d411c8ccc0137a612e0044489030a194ff5c843
https://git.kernel.org/stable/c/6e49a157d541e7e97b815a56f4bdfcbc89844a59
https://git.kernel.org/stable/c/7ece609b0ce7a7ea8acdf512a77d1fee26621637
https://git.kernel.org/stable/c/ffabad4aa91e33ced3c6ae793fb37771b3e9cb51
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Date Informations
2025-01-08 03:03:49
  • Multiple Updates
2025-01-07 03:03:22
  • Multiple Updates
2024-12-25 03:01:59
  • Multiple Updates
2024-12-12 03:04:57
  • Multiple Updates
2024-11-25 09:23:25
  • Multiple Updates
2024-11-22 21:22:39
  • Multiple Updates
2024-11-21 21:22:10
  • Multiple Updates
2024-11-20 02:58:34
  • Multiple Updates
2024-11-14 02:58:53
  • Multiple Updates
2024-11-09 02:58:54
  • Multiple Updates
2024-10-26 02:56:18
  • Multiple Updates
2024-10-25 02:58:12
  • Multiple Updates
2024-10-23 02:57:25
  • Multiple Updates
2024-10-03 02:52:45
  • Multiple Updates
2024-10-02 02:51:09
  • Multiple Updates
2024-09-15 02:48:54
  • Multiple Updates
2024-09-12 02:48:27
  • Multiple Updates
2024-09-07 02:47:26
  • Multiple Updates
2024-09-06 02:46:36
  • Multiple Updates
2024-09-04 02:49:49
  • Multiple Updates
2024-08-22 02:47:44
  • Multiple Updates
2024-08-08 21:27:59
  • Multiple Updates
2024-07-29 21:27:27
  • First insertion