CVE-2024-45015
Linux Kernel vulnerability analysis and mitigation

Overview

A vulnerability in the Linux kernel's DRM (Direct Rendering Manager) MSM/DPU driver has been identified and assigned CVE-2024-45015. The issue affects Linux kernel versions from 4.19 up to (excluding) 6.6.48, and versions from 6.7 up to (excluding) 6.10.7, as well as release candidates 6.11-rc1 through 6.11-rc4. The vulnerability stems from a NULL pointer dereference in the DPU encoder's connector assignment logic (NVD).

Technical details

The vulnerability occurs in cases where the CRTC's connectors_changed flag is set without enable/active being toggled, resulting in an atomic_enable() call followed by an atomic_disable() but without an atomic_mode_set(). This sequence leads to a NULL pointer access in the dpu_encoder_get_drm_fmt() call during atomic_enable(), as the dpu_encoder's connector is cleared in atomic_disable() but not properly reassigned due to the missing atomic_mode_set() call. The issue has been assigned a CVSS v3.1 base score of 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (Kernel Patch).

Impact

The vulnerability can result in a NULL pointer dereference in the Linux kernel's DRM MSM/DPU driver, potentially leading to a system crash or denial of service condition. The impact is limited to local attacks and primarily affects system availability, with no direct impact on confidentiality or integrity (NVD).

Mitigation and workarounds

The vulnerability has been fixed by moving the dpu_encoder's connector assignment to atomic_enable() and using drm_atomic_get_new_connector_for_encoder() to get the connector from the atomic_state. The fix has been implemented in the kernel patch and is available in updated kernel versions. Users should update their Linux kernel to the latest patched version (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • linux-gcp
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-core
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-uki-virt
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • kernel-modules-extra
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management