CVE-2024-58052

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table The function atomctrl_get_smc_sclk_range_table() does not check the return value of smu_atom_get_data_table(). If smu_atom_get_data_table() fails to retrieve SMU_Info table, it returns NULL which is later dereferenced. Found by Linux Verification Center (linuxtesting.org) with SVACE. In practice this should never happen as this code only gets called on polaris chips and the vbios data table will always be present on those chips.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Mar 2025, 15:00

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-476
References () https://git.kernel.org/stable/c/396350adf0e5ad4bf05f01e4d79bfb82f0f6c41a - () https://git.kernel.org/stable/c/396350adf0e5ad4bf05f01e4d79bfb82f0f6c41a - Patch
References () https://git.kernel.org/stable/c/ae522ad211ec4b72eaf742b25f24b0a406afcba1 - () https://git.kernel.org/stable/c/ae522ad211ec4b72eaf742b25f24b0a406afcba1 - Patch
References () https://git.kernel.org/stable/c/357445e28ff004d7f10967aa93ddb4bffa5c3688 - () https://git.kernel.org/stable/c/357445e28ff004d7f10967aa93ddb4bffa5c3688 - Patch
References () https://git.kernel.org/stable/c/2396bc91935c6da0588ce07850d07897974bd350 - () https://git.kernel.org/stable/c/2396bc91935c6da0588ce07850d07897974bd350 - Patch
References () https://git.kernel.org/stable/c/a713ba7167c2d74c477dd7764dbbdbe3199f17f4 - () https://git.kernel.org/stable/c/a713ba7167c2d74c477dd7764dbbdbe3199f17f4 - Patch
References () https://git.kernel.org/stable/c/6a30634a2e0f1dd3c6b39fd0f114c32893a9907a - () https://git.kernel.org/stable/c/6a30634a2e0f1dd3c6b39fd0f114c32893a9907a - Patch
References () https://git.kernel.org/stable/c/c47066ed7c8f3b320ef87fa6217a2b8b24e127cc - () https://git.kernel.org/stable/c/c47066ed7c8f3b320ef87fa6217a2b8b24e127cc - Patch
References () https://git.kernel.org/stable/c/0b97cd8a61b2b40fd73cf92a4bb2256462d22adb - () https://git.kernel.org/stable/c/0b97cd8a61b2b40fd73cf92a4bb2256462d22adb - Patch

13 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/c47066ed7c8f3b320ef87fa6217a2b8b24e127cc -
  • () https://git.kernel.org/stable/c/2396bc91935c6da0588ce07850d07897974bd350 -
  • () https://git.kernel.org/stable/c/a713ba7167c2d74c477dd7764dbbdbe3199f17f4 -

06 Mar 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-06 16:15

Updated : 2025-03-25 15:00


NVD link : CVE-2024-58052

Mitre link : CVE-2024-58052


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference