CVE-2024-53060 (GCVE-0-2024-53060)
Vulnerability from cvelistv5
Published
2024-11-19 17:22
Modified
2025-11-03 22:28
Summary
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported acpi_evaluate_object() may return AE_NOT_FOUND (failure), which would result in dereferencing buffer.pointer (obj) while being NULL. Although this case may be unrealistic for the current code, it is still better to protect against possible bugs. Bail out also when status is AE_NOT_FOUND. This fixes 1 FORWARD_NULL issue reported by Coverity Report: CID 1600951: Null pointer dereferences (FORWARD_NULL) (cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)
Impacted products
Vendor Product Version
Linux Linux Version: 58556dcbd5606a5daccaee73b2130bc16b48e025
Version: 43b4fa6e0e238c6e2662f4fb61d9f51c2785fb1d
Version: 234682910971732cd4da96fd95946e296e486b38
Version: 6032287747f874b52dc8b9d7490e2799736e035f
Version: cd67af3c1762de4c2483ae4dbdd98f9ea8fa56e3
Version: 975ede2a7bec52b5da1428829b3439667c8a234b
Version: 1d7175f9c57b1abf9ecfbdfd53ea760761f52ffe
Version: bf58f03931fdcf7b3c45cb76ac13244477a60f44
Create a notification for this product.
   Linux Linux Version: 4.19.323   
Version: 5.4.285   
Version: 5.10.229   
Version: 5.15.170   
Version: 6.1.115   
Version: 6.6.59   
Version: 6.11.6   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-53060",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-01T20:12:49.523326Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-476",
                "description": "CWE-476 NULL Pointer Dereference",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-01T20:17:17.614Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T22:28:54.886Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "ce8a00a00e36f61f5a1e47734332420b68784c43",
              "status": "affected",
              "version": "58556dcbd5606a5daccaee73b2130bc16b48e025",
              "versionType": "git"
            },
            {
              "lessThan": "8d7a28eca7553d35d4ce192fa1f390f2357df41b",
              "status": "affected",
              "version": "43b4fa6e0e238c6e2662f4fb61d9f51c2785fb1d",
              "versionType": "git"
            },
            {
              "lessThan": "2ac7f253deada4d449559b65a1c1cd0a6f6f19b7",
              "status": "affected",
              "version": "234682910971732cd4da96fd95946e296e486b38",
              "versionType": "git"
            },
            {
              "lessThan": "27fc29b5376998c126c85cf9b15d9dfc2afc9cbe",
              "status": "affected",
              "version": "6032287747f874b52dc8b9d7490e2799736e035f",
              "versionType": "git"
            },
            {
              "lessThan": "1a9f55ed5b512f510ccd21ad527d532e60550e80",
              "status": "affected",
              "version": "cd67af3c1762de4c2483ae4dbdd98f9ea8fa56e3",
              "versionType": "git"
            },
            {
              "lessThan": "a613a392417532ca5aaf3deac6e3277aa7aaef2b",
              "status": "affected",
              "version": "975ede2a7bec52b5da1428829b3439667c8a234b",
              "versionType": "git"
            },
            {
              "lessThan": "b9d9881237afeb52eddd70077b7174bf17e2fa30",
              "status": "affected",
              "version": "1d7175f9c57b1abf9ecfbdfd53ea760761f52ffe",
              "versionType": "git"
            },
            {
              "lessThan": "a6dd15981c03f2cdc9a351a278f09b5479d53d2e",
              "status": "affected",
              "version": "bf58f03931fdcf7b3c45cb76ac13244477a60f44",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "4.19.324",
              "status": "affected",
              "version": "4.19.323",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.286",
              "status": "affected",
              "version": "5.4.285",
              "versionType": "semver"
            },
            {
              "lessThan": "5.10.230",
              "status": "affected",
              "version": "5.10.229",
              "versionType": "semver"
            },
            {
              "lessThan": "5.15.172",
              "status": "affected",
              "version": "5.15.170",
              "versionType": "semver"
            },
            {
              "lessThan": "6.1.117",
              "status": "affected",
              "version": "6.1.115",
              "versionType": "semver"
            },
            {
              "lessThan": "6.6.61",
              "status": "affected",
              "version": "6.6.59",
              "versionType": "semver"
            },
            {
              "lessThan": "6.11.8",
              "status": "affected",
              "version": "6.11.6",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.324",
                  "versionStartIncluding": "4.19.323",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.286",
                  "versionStartIncluding": "5.4.285",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.230",
                  "versionStartIncluding": "5.10.229",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.172",
                  "versionStartIncluding": "5.15.170",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.117",
                  "versionStartIncluding": "6.1.115",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.61",
                  "versionStartIncluding": "6.6.59",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.11.8",
                  "versionStartIncluding": "6.11.6",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: prevent NULL pointer dereference if ATIF is not supported\n\nacpi_evaluate_object() may return AE_NOT_FOUND (failure), which\nwould result in dereferencing buffer.pointer (obj) while being NULL.\n\nAlthough this case may be unrealistic for the current code, it is\nstill better to protect against possible bugs.\n\nBail out also when status is AE_NOT_FOUND.\n\nThis fixes 1 FORWARD_NULL issue reported by Coverity\nReport: CID 1600951:  Null pointer dereferences  (FORWARD_NULL)\n\n(cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T09:51:56.316Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/ce8a00a00e36f61f5a1e47734332420b68784c43"
        },
        {
          "url": "https://git.kernel.org/stable/c/8d7a28eca7553d35d4ce192fa1f390f2357df41b"
        },
        {
          "url": "https://git.kernel.org/stable/c/2ac7f253deada4d449559b65a1c1cd0a6f6f19b7"
        },
        {
          "url": "https://git.kernel.org/stable/c/27fc29b5376998c126c85cf9b15d9dfc2afc9cbe"
        },
        {
          "url": "https://git.kernel.org/stable/c/1a9f55ed5b512f510ccd21ad527d532e60550e80"
        },
        {
          "url": "https://git.kernel.org/stable/c/a613a392417532ca5aaf3deac6e3277aa7aaef2b"
        },
        {
          "url": "https://git.kernel.org/stable/c/b9d9881237afeb52eddd70077b7174bf17e2fa30"
        },
        {
          "url": "https://git.kernel.org/stable/c/a6dd15981c03f2cdc9a351a278f09b5479d53d2e"
        }
      ],
      "title": "drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-53060",
    "datePublished": "2024-11-19T17:22:31.502Z",
    "dateReserved": "2024-11-19T17:17:24.974Z",
    "dateUpdated": "2025-11-03T22:28:54.886Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-53060\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-01T20:12:49.523326Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-476\", \"description\": \"CWE-476 NULL Pointer Dereference\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-01T15:29:48.588Z\"}}], \"cna\": {\"title\": \"drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"58556dcbd5606a5daccaee73b2130bc16b48e025\", \"lessThan\": \"ce8a00a00e36f61f5a1e47734332420b68784c43\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"43b4fa6e0e238c6e2662f4fb61d9f51c2785fb1d\", \"lessThan\": \"8d7a28eca7553d35d4ce192fa1f390f2357df41b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"234682910971732cd4da96fd95946e296e486b38\", \"lessThan\": \"2ac7f253deada4d449559b65a1c1cd0a6f6f19b7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6032287747f874b52dc8b9d7490e2799736e035f\", \"lessThan\": \"27fc29b5376998c126c85cf9b15d9dfc2afc9cbe\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"cd67af3c1762de4c2483ae4dbdd98f9ea8fa56e3\", \"lessThan\": \"1a9f55ed5b512f510ccd21ad527d532e60550e80\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"975ede2a7bec52b5da1428829b3439667c8a234b\", \"lessThan\": \"a613a392417532ca5aaf3deac6e3277aa7aaef2b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1d7175f9c57b1abf9ecfbdfd53ea760761f52ffe\", \"lessThan\": \"b9d9881237afeb52eddd70077b7174bf17e2fa30\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bf58f03931fdcf7b3c45cb76ac13244477a60f44\", \"lessThan\": \"a6dd15981c03f2cdc9a351a278f09b5479d53d2e\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.19.323\", \"lessThan\": \"4.19.324\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.4.285\", \"lessThan\": \"5.4.286\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.10.229\", \"lessThan\": \"5.10.230\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.15.170\", \"lessThan\": \"5.15.172\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"6.1.115\", \"lessThan\": \"6.1.117\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"6.6.59\", \"lessThan\": \"6.6.61\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"6.11.6\", \"lessThan\": \"6.11.8\", \"versionType\": \"semver\"}], \"programFiles\": [\"drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ce8a00a00e36f61f5a1e47734332420b68784c43\"}, {\"url\": \"https://git.kernel.org/stable/c/8d7a28eca7553d35d4ce192fa1f390f2357df41b\"}, {\"url\": \"https://git.kernel.org/stable/c/2ac7f253deada4d449559b65a1c1cd0a6f6f19b7\"}, {\"url\": \"https://git.kernel.org/stable/c/27fc29b5376998c126c85cf9b15d9dfc2afc9cbe\"}, {\"url\": \"https://git.kernel.org/stable/c/1a9f55ed5b512f510ccd21ad527d532e60550e80\"}, {\"url\": \"https://git.kernel.org/stable/c/a613a392417532ca5aaf3deac6e3277aa7aaef2b\"}, {\"url\": \"https://git.kernel.org/stable/c/b9d9881237afeb52eddd70077b7174bf17e2fa30\"}, {\"url\": \"https://git.kernel.org/stable/c/a6dd15981c03f2cdc9a351a278f09b5479d53d2e\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/amdgpu: prevent NULL pointer dereference if ATIF is not supported\\n\\nacpi_evaluate_object() may return AE_NOT_FOUND (failure), which\\nwould result in dereferencing buffer.pointer (obj) while being NULL.\\n\\nAlthough this case may be unrealistic for the current code, it is\\nstill better to protect against possible bugs.\\n\\nBail out also when status is AE_NOT_FOUND.\\n\\nThis fixes 1 FORWARD_NULL issue reported by Coverity\\nReport: CID 1600951:  Null pointer dereferences  (FORWARD_NULL)\\n\\n(cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.324\", \"versionStartIncluding\": \"4.19.323\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.286\", \"versionStartIncluding\": \"5.4.285\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.230\", \"versionStartIncluding\": \"5.10.229\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.172\", \"versionStartIncluding\": \"5.15.170\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.117\", \"versionStartIncluding\": \"6.1.115\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.61\", \"versionStartIncluding\": \"6.6.59\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11.8\", \"versionStartIncluding\": \"6.11.6\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:51:56.316Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-53060\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-01T20:17:17.614Z\", \"dateReserved\": \"2024-11-19T17:17:24.974Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-11-19T17:22:31.502Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…