Lucene search

K
cve416baaa9-dc9f-4396-8d5f-8c081fb06d67CVE-2024-27040
HistoryMay 01, 2024 - 1:15 p.m.

CVE-2024-27040

2024-05-0113:15:49
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
44
linux kernel
vulnerability
fix
null pointer

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.1%

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add ‘replay’ NULL check in ‘edp_set_replay_allow_active()’

In the first if statement, we’re checking if ‘replay’ is NULL. But in
the second if statement, we’re not checking if ‘replay’ is NULL again
before calling replay->funcs->replay_set_power_opt().

if (replay == NULL && force_static)
return false;

if (link->replay_settings.replay_feature_enabled &&
replay->funcs->replay_set_power_opt) {
replay->funcs->replay_set_power_opt(replay, *power_opts, panel_inst);
link->replay_settings.replay_power_opt_active = *power_opts;
}

If ‘replay’ is NULL, this will cause a null pointer dereference.

Fixes the below found by smatch:
drivers/gpu/drm/amd/amdgpu/…/display/dc/link/protocols/link_edp_panel_control.c:895 edp_set_replay_allow_active() error: we previously assumed ‘replay’ could be null (see line 887)

VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.1%

Related for CVE-2024-27040