CVE-2024-43904
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
26/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/amd/display: Add null checks for &#39;stream&#39; and &#39;plane&#39; before dereferencing<br />
<br />
This commit adds null checks for the &#39;stream&#39; and &#39;plane&#39; variables in<br />
the dcn30_apply_idle_power_optimizations function. These variables were<br />
previously assumed to be null at line 922, but they were used later in<br />
the code without checking if they were null. This could potentially lead<br />
to a null pointer dereference, which would cause a crash.<br />
<br />
The null checks ensure that &#39;stream&#39; and &#39;plane&#39; are not null before<br />
they are used, preventing potential crashes.<br />
<br />
Fixes the below static smatch checker:<br />
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:938 dcn30_apply_idle_power_optimizations() error: we previously assumed &#39;stream&#39; could be null (see line 922)<br />
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:940 dcn30_apply_idle_power_optimizations() error: we previously assumed &#39;plane&#39; could be null (see line 922)
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.10.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/10c20d79d59cadfe572480d98cec271a89ffb024
- https://git.kernel.org/stable/c/15c2990e0f0108b9c3752d7072a97d45d4283aea
- https://git.kernel.org/stable/c/16a8a2a839d19c4cf7253642b493ffb8eee1d857
- https://git.kernel.org/stable/c/5e84eda48ffb2363437db44bbd0235594f8a58f9
- https://git.kernel.org/stable/c/fcf9d6a9f30ea414b6b84a6e901cebd44e146847
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



