DEBIAN-CVE-2024-56697

Source
https://security-tracker.debian.org/tracker/CVE-2024-56697
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2024-56697.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2024-56697
Upstream
Published
2024-12-28T10:15:16Z
Modified
2025-09-25T04:23:20.905084Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the memory allocation issue in amdgpudiscoverygetnpsinfo() Fix two issues with memory allocation in amdgpudiscoverygetnpsinfo() for memranges: - Add a check for allocation failure to avoid dereferencing a null pointer. - As suggested by Christophe, use kvcalloc() for memory allocation, which checks for multiplication overflow. Additionally, assign the output parameters npstype and range_cnt after the kvcalloc() call to prevent modifying the output parameters in case of an error return.

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}