cve/2024/CVE-2024-26672.md

20 lines
1.8 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-26672](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26672)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=d38ceaf99ed015f2a0b9af3499791bd3a3daae21%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
2025-09-29 16:08:36 +00:00
### Description
In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'Fixes the below:drivers/gpu/drm/amd/amdgpu/amdgpu_mca.c:377 amdgpu_mca_smu_get_mca_entry() warn: variable dereferenced before check 'mca_funcs' (see line 368)357 int amdgpu_mca_smu_get_mca_entry(struct amdgpu_device *adev, enum amdgpu_mca_error_type type,358 int idx, struct mca_bank_entry *entry)359 {360 const struct amdgpu_mca_smu_funcs *mca_funcs = adev->mca.mca_funcs;361 int count;362363 switch (type) {364 case AMDGPU_MCA_ERROR_TYPE_UE:365 count = mca_funcs->max_ue_count;mca_funcs is dereferenced here.366 break;367 case AMDGPU_MCA_ERROR_TYPE_CE:368 count = mca_funcs->max_ce_count;mca_funcs is dereferenced here.369 break;370 default:371 return -EINVAL;372 }373374 if (idx >= count)375 return -EINVAL;376377 if (mca_funcs && mca_funcs->mca_get_mca_entry) ^^^^^^^^^Checked too late!
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/bygregonline/devsec-fastapi-report