First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check null pointers before multiple uses [WHAT & HOW] Poniters, such as stream_enc and dc->bw_vbios, are null checked previously in the same function, so Coverity warns "implies that stream_enc and dc->bw_vbios might be null". They are used multiple times in the subsequent code and need to be checked. This fixes 10 FORWARD_NULL issues reported by Coverity.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.11.3 | |
debian/linux | <=5.10.223-1<=5.10.226-1<=6.1.123-1<=6.1.128-1 | 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-49920 has not been officially rated, but it is important to address it due to potential impacts on system stability and security.
To fix CVE-2024-49920, update your Linux kernel to version 6.12.12-1 or later.
CVE-2024-49920 affects Linux kernel versions prior to 6.12.12.
Yes, CVE-2024-49920 is specifically associated with the AMD display component of the Linux kernel.
Systems running vulnerable versions of the Linux kernel that utilize AMD graphics components are at risk from CVE-2024-49920.