
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-44967 affects the Linux kernel's DRM (Direct Rendering Manager) subsystem, specifically in the MGAG200 graphics driver. The vulnerability was discovered in the I2C (Inter-Integrated Circuit) lifetime management code. The issue stems from a cleanup mechanism that releases the I2C adapter when the underlying Linux device is removed, while the connector still maintains a reference to it, resulting in a stale pointer in struct drm_connector.ddc (NVD).
The vulnerability exists in the mgag200i2c.c driver file where the managed cleanup with devmaddactionorreset() prematurely releases the I2C adapter. This occurs when the underlying Linux device is removed, but leaves behind a stale pointer in struct drmconnector.ddc. The issue has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability could potentially lead to memory corruption due to the stale pointer issue, which might result in system crashes, information disclosure, or potential privilege escalation in the affected Linux kernel versions. The vulnerability affects Linux kernel versions from 6.0 up to versions before 6.1.105, 6.2 through 6.6.46, and 6.7 through 6.10.5 (NVD).
The vulnerability has been patched by modifying the I2C adapter lifetime management to bind it to the DRM device instead of the Linux device. The fix uses DRM's managed release (drmmaddactionorreset) to ensure proper cleanup order, where the connector is cleaned up before the I2C adapter when the DRM device is removed (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”