In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Check UnboundedRequestEnabled's value
CalculateSwathAndDETConfigurationparamsst's UnboundedRequestEnabled is a pointer (i.e. dmlboolt *UnboundedRequestEnabled), and thus if (p->UnboundedRequestEnabled) checks its address, not bool value.
This fixes 1 REVERSE_INULL issue reported by Coverity.
[
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/amd/display/dc/dml2/display_mode_core.c",
"function": "CalculateSwathAndDETConfiguration"
},
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a7b38c7852093385d0605aa3c8a2efd6edd1edfd",
"id": "CVE-2024-46778-118d2dcc",
"digest": {
"function_hash": "11064038576347541969847707561635160123",
"length": 9062.0
}
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/amd/display/dc/dml2/display_mode_core.c"
},
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a7b38c7852093385d0605aa3c8a2efd6edd1edfd",
"id": "CVE-2024-46778-5e9b042b",
"digest": {
"threshold": 0.9,
"line_hashes": [
"205434963553193480674945458966071379704",
"44555036333008023695412693605990409592",
"320306887004307786073880469417744529966",
"35825154273453849742974712260238499066"
]
}
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/amd/display/dc/dml2/display_mode_core.c",
"function": "CalculateSwathAndDETConfiguration"
},
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e2b49a85e7974d21364798c5d4aa8070aa864d9",
"id": "CVE-2024-46778-60f38172",
"digest": {
"function_hash": "11064038576347541969847707561635160123",
"length": 9062.0
}
},
{
"deprecated": false,
"target": {
"file": "drivers/gpu/drm/amd/display/dc/dml2/display_mode_core.c"
},
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e2b49a85e7974d21364798c5d4aa8070aa864d9",
"id": "CVE-2024-46778-6568b64b",
"digest": {
"threshold": 0.9,
"line_hashes": [
"205434963553193480674945458966071379704",
"44555036333008023695412693605990409592",
"320306887004307786073880469417744529966",
"35825154273453849742974712260238499066"
]
}
}
]