{"id":"CVE-2024-50201","summary":"drm/radeon: Fix encoder-\u003epossible_clones","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: Fix encoder-\u003epossible_clones\n\nInclude the encoder itself in its possible_clones bitmask.\nIn the past nothing validated that drivers were populating\npossible_clones correctly, but that changed in commit\n74d2aacbe840 (\"drm: Validate encoder-\u003epossible_clones\").\nLooks like radeon never got the memo and is still not\nfollowing the rules 100% correctly.\n\nThis results in some warnings during driver initialization:\nBogus possible_clones: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7)\nWARNING: CPU: 0 PID: 170 at drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c\n...\n\n(cherry picked from commit 3b6e7d40649c0d75572039aff9d0911864c689db)","modified":"2026-04-02T12:21:20.026589Z","published":"2024-11-08T05:56:15.622Z","related":["SUSE-SU-2024:4314-1","SUSE-SU-2024:4315-1","SUSE-SU-2024:4316-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4376-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50201.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1a235af0216411a32ab4db54f7bd19020b46c86d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/28127dba64d8ae1a0b737b973d6d029908599611"},{"type":"WEB","url":"https://git.kernel.org/stable/c/68801730ebb9393460b30cd3885e407f15da27a9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c3cd27d85f0778f4ec07384d7516b33153759b8e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/df75c78bfeff99f9b4815c3e79e2b1b1e34fe264"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fda5dc80121b12871dc343ab37e0c3f0d138825d"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50201.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50201"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"74d2aacbe84042d89f572a3112a146fca05bfcb1"},{"fixed":"df75c78bfeff99f9b4815c3e79e2b1b1e34fe264"},{"fixed":"fda5dc80121b12871dc343ab37e0c3f0d138825d"},{"fixed":"c3cd27d85f0778f4ec07384d7516b33153759b8e"},{"fixed":"1a235af0216411a32ab4db54f7bd19020b46c86d"},{"fixed":"68801730ebb9393460b30cd3885e407f15da27a9"},{"fixed":"28127dba64d8ae1a0b737b973d6d029908599611"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50201.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}