In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: check dpu_plane_atomic_print_state() for valid sspp
Similar to the r_pipe sspp protect, add a check to protect
the pipe state prints to avoid NULL ptr dereference for cases when
the state is dumped without a corresponding atomic_check() where the
pipe->sspp is assigned.
Patchwork: https://patchwork.freedesktop.org/patch/628404/
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 03 Apr 2025 03:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | threat_severity 
 | threat_severity 
 | 
Tue, 25 Mar 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Linux Linux linux Kernel | |
| Weaknesses | CWE-476 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Vendors & Products | Linux Linux linux Kernel | 
Fri, 14 Mar 2025 02:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | threat_severity 
 | cvssV3_1 
 
 | 
Thu, 06 Mar 2025 16:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: check dpu_plane_atomic_print_state() for valid sspp Similar to the r_pipe sspp protect, add a check to protect the pipe state prints to avoid NULL ptr dereference for cases when the state is dumped without a corresponding atomic_check() where the pipe->sspp is assigned. Patchwork: https://patchwork.freedesktop.org/patch/628404/ | |
| Title | drm/msm/dpu: check dpu_plane_atomic_print_state() for valid sspp | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Linux
Published: 2025-03-06T15:54:12.374Z
Updated: 2025-10-01T19:36:36.273Z
Reserved: 2025-03-06T15:52:09.182Z
Link: CVE-2024-58073
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Modified
Published: 2025-03-06T16:15:53.833
Modified: 2025-10-01T20:18:13.293
Link: CVE-2024-58073
 Redhat
                        Redhat