{"uuid": "78193f15-bad1-4902-a14b-7956f77502a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43904", "type": "seen", "source": "https://t.me/cvedetector/4130", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43904 - AMD Display Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-43904 \nPublished : Aug. 26, 2024, 11:15 a.m. | 21\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing  \n  \nThis commit adds null checks for the 'stream' and 'plane' variables in  \nthe dcn30_apply_idle_power_optimizations function. These variables were  \npreviously assumed to be null at line 922, but they were used later in  \nthe code without checking if they were null. This could potentially lead  \nto a null pointer dereference, which would cause a crash.  \n  \nThe null checks ensure that 'stream' and 'plane' are not null before  \nthey are used, preventing potential crashes.  \n  \nFixes the below static smatch checker:  \ndrivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:938 dcn30_apply_idle_power_optimizations() error: we previously assumed 'stream' could be null (see line 922)  \ndrivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:940 dcn30_apply_idle_power_optimizations() error: we previously assumed 'plane' could be null (see line 922) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T13:43:35.000000Z"}