CVE-2024-58073: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: check dpu_plane_atomic_print_state() for valid sspp Similar to the r_pipe sspp protect, add a check to protect the pipe state prints to avoid NULL ptr dereference for cases when the state is dumped without a corresponding atomic_check() where the pipe->sspp is assigned. Patchwork: https://patchwork.freedesktop.org/patch/628404/
AI Analysis
Technical Summary
CVE-2024-58073 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem for Qualcomm's MSM display processing unit (DPU). The vulnerability arises in the function dpu_plane_atomic_print_state(), which is responsible for printing the state of display planes during atomic state dumps. The issue is a missing validation check for the source pipe (sspp) pointer before dereferencing it. Without this check, if the state is dumped without a prior atomic_check() call that assigns the pipe->sspp, a NULL pointer dereference can occur. This can lead to a kernel crash (denial of service) or potentially other undefined behaviors. The patch introduces a validation similar to the existing r_pipe sspp protection, ensuring that the pipe state prints are protected against NULL pointer dereferences. This vulnerability is a logic flaw in the kernel's DRM driver code and does not require user interaction or authentication to trigger if an attacker can induce the relevant state dump. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in recent kernel builds prior to the patch. The issue is technical and low-level, impacting the stability and reliability of the Linux kernel's graphics subsystem on affected devices, particularly those using Qualcomm MSM hardware with the DPU driver.
Potential Impact
For European organizations, the primary impact of CVE-2024-58073 is potential denial of service due to kernel crashes on Linux systems running affected kernel versions with Qualcomm MSM DPU drivers. This could disrupt services relying on graphical output or systems that perform atomic state dumps for debugging or monitoring. Organizations using Linux-based embedded systems, mobile devices, or servers with Qualcomm MSM hardware are at risk. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting kernel panic could cause system downtime, impacting availability. Critical infrastructure or industrial control systems using such hardware could face operational interruptions. Additionally, the lack of authentication requirement means local users or processes with the ability to trigger state dumps could exploit this flaw. However, since no known exploits exist in the wild, the immediate risk is moderate but warrants prompt patching to prevent future exploitation. European entities with significant deployment of Linux on Qualcomm MSM platforms, such as telecom operators, mobile device manufacturers, and embedded system integrators, should be particularly vigilant.
Mitigation Recommendations
To mitigate CVE-2024-58073, European organizations should: 1) Identify all Linux systems running affected kernel versions with Qualcomm MSM DPU drivers, focusing on embedded devices, mobile platforms, and servers using this hardware. 2) Apply the official Linux kernel patch that adds the necessary NULL pointer checks in dpu_plane_atomic_print_state() as soon as it is available and tested. 3) If immediate patching is not feasible, restrict access to interfaces or tools that can trigger atomic state dumps to trusted administrators only, minimizing the risk of accidental or malicious exploitation. 4) Monitor kernel logs and system stability for signs of crashes related to the DRM subsystem to detect potential exploitation attempts. 5) Engage with hardware and Linux distribution vendors to ensure timely updates and backports of the fix for long-term support kernels. 6) Incorporate this vulnerability into vulnerability management and incident response plans, ensuring readiness to respond to any emerging exploit activity. These steps go beyond generic advice by focusing on hardware-specific identification, access control to diagnostic interfaces, and proactive monitoring tailored to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2024-58073: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: check dpu_plane_atomic_print_state() for valid sspp Similar to the r_pipe sspp protect, add a check to protect the pipe state prints to avoid NULL ptr dereference for cases when the state is dumped without a corresponding atomic_check() where the pipe->sspp is assigned. Patchwork: https://patchwork.freedesktop.org/patch/628404/
AI-Powered Analysis
Technical Analysis
CVE-2024-58073 is a vulnerability identified in the Linux kernel, specifically within the Direct Rendering Manager (DRM) subsystem for Qualcomm's MSM display processing unit (DPU). The vulnerability arises in the function dpu_plane_atomic_print_state(), which is responsible for printing the state of display planes during atomic state dumps. The issue is a missing validation check for the source pipe (sspp) pointer before dereferencing it. Without this check, if the state is dumped without a prior atomic_check() call that assigns the pipe->sspp, a NULL pointer dereference can occur. This can lead to a kernel crash (denial of service) or potentially other undefined behaviors. The patch introduces a validation similar to the existing r_pipe sspp protection, ensuring that the pipe state prints are protected against NULL pointer dereferences. This vulnerability is a logic flaw in the kernel's DRM driver code and does not require user interaction or authentication to trigger if an attacker can induce the relevant state dump. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in recent kernel builds prior to the patch. The issue is technical and low-level, impacting the stability and reliability of the Linux kernel's graphics subsystem on affected devices, particularly those using Qualcomm MSM hardware with the DPU driver.
Potential Impact
For European organizations, the primary impact of CVE-2024-58073 is potential denial of service due to kernel crashes on Linux systems running affected kernel versions with Qualcomm MSM DPU drivers. This could disrupt services relying on graphical output or systems that perform atomic state dumps for debugging or monitoring. Organizations using Linux-based embedded systems, mobile devices, or servers with Qualcomm MSM hardware are at risk. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting kernel panic could cause system downtime, impacting availability. Critical infrastructure or industrial control systems using such hardware could face operational interruptions. Additionally, the lack of authentication requirement means local users or processes with the ability to trigger state dumps could exploit this flaw. However, since no known exploits exist in the wild, the immediate risk is moderate but warrants prompt patching to prevent future exploitation. European entities with significant deployment of Linux on Qualcomm MSM platforms, such as telecom operators, mobile device manufacturers, and embedded system integrators, should be particularly vigilant.
Mitigation Recommendations
To mitigate CVE-2024-58073, European organizations should: 1) Identify all Linux systems running affected kernel versions with Qualcomm MSM DPU drivers, focusing on embedded devices, mobile platforms, and servers using this hardware. 2) Apply the official Linux kernel patch that adds the necessary NULL pointer checks in dpu_plane_atomic_print_state() as soon as it is available and tested. 3) If immediate patching is not feasible, restrict access to interfaces or tools that can trigger atomic state dumps to trusted administrators only, minimizing the risk of accidental or malicious exploitation. 4) Monitor kernel logs and system stability for signs of crashes related to the DRM subsystem to detect potential exploitation attempts. 5) Engage with hardware and Linux distribution vendors to ensure timely updates and backports of the fix for long-term support kernels. 6) Incorporate this vulnerability into vulnerability management and incident response plans, ensuring readiness to respond to any emerging exploit activity. These steps go beyond generic advice by focusing on hardware-specific identification, access control to diagnostic interfaces, and proactive monitoring tailored to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-03-06T15:52:09.182Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9822c4522896dcbde2c4
Added to database: 5/21/2025, 9:08:50 AM
Last enriched: 6/28/2025, 5:55:47 AM
Last updated: 7/28/2025, 12:49:59 PM
Views: 9
Related Threats
CVE-2025-8923: SQL Injection in code-projects Job Diary
MediumCVE-2025-8922: SQL Injection in code-projects Job Diary
MediumCVE-2025-45313: n/a
HighCVE-2025-8921: SQL Injection in code-projects Job Diary
MediumCVE-2025-8920: Cross Site Scripting in Portabilis i-Diario
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.