{"id":"CVE-2024-36014","summary":"drm/arm/malidp: fix a possible null pointer dereference","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/arm/malidp: fix a possible null pointer dereference\n\nIn malidp_mw_connector_reset, new memory is allocated with kzalloc, but\nno check is performed. In order to prevent null pointer dereferencing,\nensure that mw_state is checked before calling\n__drm_atomic_helper_connector_reset.","modified":"2026-03-20T12:36:47.689518Z","published":"2024-05-29T06:06:25.631Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2493-1","SUSE-SU-2024:2561-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20249-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36014.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/335cc45ef2b81b68be63c698b4f867a530bdf7a5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3e54d4e95120641216dfe91a6c49f116a9f68490"},{"type":"WEB","url":"https://git.kernel.org/stable/c/565d9ad7e5a18eb69ed8b66a9e9bb3f45346520c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/93f76ec1eddce60dbb5885cbc0d7df54adee4639"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a1f95aede6285dba6dd036d907196f35ae3a11ea"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a5fa5b40a278a3ca978fed64707bd27614adb1eb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b6cc5dd06336ed8bb3a7a1fc5aaf7d5e88bc0818"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b77620730f614059db2470e8ebab3e725280fc6d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e4b52d49383306ef73fd1bd9102538beebb0fe07"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36014.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36014"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8cbc5caf36ef7a299b5cbedf55f27fd898d700bf"},{"fixed":"b6cc5dd06336ed8bb3a7a1fc5aaf7d5e88bc0818"},{"fixed":"565d9ad7e5a18eb69ed8b66a9e9bb3f45346520c"},{"fixed":"a5fa5b40a278a3ca978fed64707bd27614adb1eb"},{"fixed":"3e54d4e95120641216dfe91a6c49f116a9f68490"},{"fixed":"e4b52d49383306ef73fd1bd9102538beebb0fe07"},{"fixed":"335cc45ef2b81b68be63c698b4f867a530bdf7a5"},{"fixed":"b77620730f614059db2470e8ebab3e725280fc6d"},{"fixed":"93f76ec1eddce60dbb5885cbc0d7df54adee4639"},{"fixed":"a1f95aede6285dba6dd036d907196f35ae3a11ea"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-36014.json"}}],"schema_version":"1.7.5"}