We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-49923

drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags



AssignerLinux
Reserved2024-10-21
Published2024-10-21
Updated2024-11-05

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags [WHAT & HOW] "dcn20_validate_apply_pipe_split_flags" dereferences merge, and thus it cannot be a null pointer. Let's pass a valid pointer to avoid null dereference. This fixes 2 FORWARD_NULL issues reported by Coverity.

Product status

Default status
unaffected

1da177e4c3f4 before 85aa996ecfaa
affected

1da177e4c3f4 before 9a05270869f4
affected

1da177e4c3f4 before 5559598742fb
affected

Default status
affected

6.10.14
unaffected

6.11.3
unaffected

6.12-rc1
unaffected

References

https://git.kernel.org/stable/c/85aa996ecfaa95d1e922867390502d23ce21b905

https://git.kernel.org/stable/c/9a05270869f40c89f8d184fe2d37cb86e0d7e5f5

https://git.kernel.org/stable/c/5559598742fb4538e4c51c48ef70563c49c2af23

cve.org CVE-2024-49923

nvd.nist.gov CVE-2024-49923

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.