CVE-2024-46812 – drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration
https://notcve.org/view.php?id=CVE-2024-46812
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration [Why] Coverity reports Memory - illegal accesses. [How] Skip inactive planes. • https://git.kernel.org/stable/c/3300a039caf850376bc3416c808cd8879da412bb https://git.kernel.org/stable/c/8406158a546441b73f0b216aedacbf9a1e5748fb https://git.kernel.org/stable/c/ee9d6df6d9172917d9ddbd948bb882652d5ecd29 https://git.kernel.org/stable/c/a54f7e866cc73a4cb71b8b24bb568ba35c8969df •
CVE-2024-46811 – drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box
https://notcve.org/view.php?id=CVE-2024-46811
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box [Why] Coverity reports OVERRUN warning. soc.num_states could be 40. But array range of bw_params->clk_table.entries is 8. [How] Assert if soc.num_states greater than 8. • https://git.kernel.org/stable/c/4003bac784380fed1f94f197350567eaa73a409d https://git.kernel.org/stable/c/aba188d6f4ebaf52acf13f204db2bd2c22072504 https://git.kernel.org/stable/c/188fd1616ec43033cedbe343b6579e9921e2d898 •
CVE-2024-46810 – drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ
https://notcve.org/view.php?id=CVE-2024-46810
In the Linux kernel, the following vulnerability has been resolved: drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ Make sure the connector is fully initialized before signalling any HPD events via drm_kms_helper_hotplug_event(), otherwise this may lead to NULL pointer dereference. • https://git.kernel.org/stable/c/adc5674c23b8191e596ed0dbaa9600265ac896a8 https://git.kernel.org/stable/c/e1b121f21bbc56a6ae035aa5b77daac62bfb9be5 https://git.kernel.org/stable/c/9d567126474e68f959b2c2543c375f3bb32e948a https://git.kernel.org/stable/c/1fb13693953737783b424aa4712f0a27a9eaf5a8 https://git.kernel.org/stable/c/162e48cb1d84c2c966b649b8ac5c9d4f75f6d44f •
CVE-2024-46809 – drm/amd/display: Check BIOS images before it is used
https://notcve.org/view.php?id=CVE-2024-46809
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check BIOS images before it is used BIOS images may fail to load and null checks are added before they are used. This fixes 6 NULL_RETURNS issues reported by Coverity. • https://git.kernel.org/stable/c/4fcd903a5d9e897420d7d8b3ca55c6e5dbb47379 https://git.kernel.org/stable/c/c5cb98554c4c6265b494d040c1c62f1db2fa28a6 https://git.kernel.org/stable/c/eef7301e674438913134539e77dd887960949f20 https://git.kernel.org/stable/c/e50bec62acaeec03afc6fa5dfb2426e52d049cf5 https://git.kernel.org/stable/c/e46b70a7cfed71cb84e985c785c39c16df5c28cb https://git.kernel.org/stable/c/8b0ddf19cca2a352b2a7e01d99d3ba949a99c84c •
CVE-2024-46808 – drm/amd/display: Add missing NULL pointer check within dpcd_extend_address_range
https://notcve.org/view.php?id=CVE-2024-46808
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add missing NULL pointer check within dpcd_extend_address_range [Why & How] ASSERT if return NULL from kcalloc. • https://git.kernel.org/stable/c/ca0b0b0a22306f2e51105ac48f4a09c2fbbb504e https://git.kernel.org/stable/c/5524fa301ba649f8cf00848f91468e0ba7e4f24c •