CVE-2024-43909 – drm/amdgpu/pm: Fix the null pointer dereference for smu7
https://notcve.org/view.php?id=CVE-2024-43909
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/pm: Fix the null pointer dereference for smu7 optimize the code to avoid pass a null pointer (hwmgr->backend) to function smu7_update_edc_leakage_table. • https://git.kernel.org/stable/c/37b9df457cbcf095963d18f17d6cb7dfa0a03fce https://git.kernel.org/stable/c/1b8aa82b80bd947b68a8ab051d960a0c7935e22d https://git.kernel.org/stable/c/09544cd95c688d3041328a4253bd7514972399bb https://git.kernel.org/stable/c/7f56f050f02c27ed89cce1ea0c04b34abce32751 https://git.kernel.org/stable/c/c02c1960c93eede587576625a1221205a68a904f •
CVE-2024-43908 – drm/amdgpu: Fix the null pointer dereference to ras_manager
https://notcve.org/view.php?id=CVE-2024-43908
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix the null pointer dereference to ras_manager Check ras_manager before using it • https://git.kernel.org/stable/c/ff5c4eb71ee8951c789b079f6e948f86708b04ed https://git.kernel.org/stable/c/d81c1eeb333d84b3012a91c0500189dc1d71e46c https://git.kernel.org/stable/c/56e848034ccabe44e8f22ffcf49db771c17b0d0a https://git.kernel.org/stable/c/48cada0ac79e4775236d642e9ec5998a7c7fb7a4 https://git.kernel.org/stable/c/b89616333979114bb0da5fa40fb6e4a2f5294ca2 https://git.kernel.org/stable/c/033187a70ba9743c73a810a006816e5553d1e7d4 https://git.kernel.org/stable/c/4c11d30c95576937c6c35e6f29884761f2dddb43 •
CVE-2024-43907 – drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules
https://notcve.org/view.php?id=CVE-2024-43907
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules Check the pointer value to fix potential null pointer dereference • https://git.kernel.org/stable/c/c1749313f35b98e2e655479f037db37f19756622 https://git.kernel.org/stable/c/0c065e50445aea2e0a1815f12e97ee49e02cbaac https://git.kernel.org/stable/c/e04d18c29954441aa1054af649f957ffad90a201 https://git.kernel.org/stable/c/3a01bf2ca9f860fdc88c358567b8fa3033efcf30 https://git.kernel.org/stable/c/13937a40aae4efe64592ba48c057ac3c72f7fe82 https://git.kernel.org/stable/c/d19fb10085a49b77578314f69fff21562f7cd054 •
CVE-2024-43906 – drm/admgpu: fix dereferencing null pointer context
https://notcve.org/view.php?id=CVE-2024-43906
In the Linux kernel, the following vulnerability has been resolved: drm/admgpu: fix dereferencing null pointer context When user space sets an invalid ta type, the pointer context will be empty. So it need to check the pointer context before using it • https://git.kernel.org/stable/c/641dac64178ccdb9e45c92b67120316896294d05 https://git.kernel.org/stable/c/4fd52f7c2c11d330571c6bde06e5ea508ec25c9d https://git.kernel.org/stable/c/030ffd4d43b433bc6671d9ec34fc12c59220b95d •
CVE-2024-43905 – drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr
https://notcve.org/view.php?id=CVE-2024-43905
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr Check return value and conduct null pointer handling to avoid null pointer dereference. • https://git.kernel.org/stable/c/2ac9deb7e087f0b461c3559d9eaa6b9cf19d3fa8 https://git.kernel.org/stable/c/0fa11f9df96217c2785b040629ff1a16900fb51c https://git.kernel.org/stable/c/c2629daf218a325f4d69754452cd42fe8451c15b https://git.kernel.org/stable/c/2e538944996d0dd497faf8ee81f8bfcd3aca7d80 https://git.kernel.org/stable/c/69a441473fec2fc2aa2cf56122d6c42c4266a239 https://git.kernel.org/stable/c/50151b7f1c79a09117837eb95b76c2de76841dab •